| 000 | 00000cam u2200205 a 4500 | |
| 001 | 000046130921 | |
| 005 | 20221020141559 | |
| 008 | 221019s2008 enka b 001 0 eng | |
| 010 | ▼a 2008023549 | |
| 015 | ▼a GBA893702 ▼2 bnb | |
| 020 | ▼a 0521887836 (hbk. : alk. paper) | |
| 020 | ▼a 9780521887830 (hbk. : alk. paper) | |
| 035 | ▼a (KERIS)BIB000011675194 | |
| 040 | ▼a 211052 ▼c 211052 ▼d 211052 ▼d 211052 ▼d 211052 ▼d 211052 ▼d 211052 ▼d 211052 ▼d 211052 ▼d 211052 ▼d 211052 ▼d 211052 ▼d 211052 ▼d 211009 | |
| 082 | 0 0 | ▼a 005.8 ▼2 23 |
| 084 | ▼a 005.8 ▼2 DDCK | |
| 090 | ▼a 005.8 ▼b J29 w | |
| 100 | 1 | ▼a James Kempf. |
| 245 | 0 0 | ▼a Wireless Internet security : ▼b architecture and protocols / ▼c James Kempf. |
| 260 | ▼a Cambridge, UK ; ▼a New York : ▼b Cambridge University Press, ▼c 2008. | |
| 300 | ▼a ix, 212 p. : ▼b ill. ; ▼c 26 cm. | |
| 504 | ▼a Includes bibliographical references (p. [199]-201) and index. | |
| 700 | 1 | ▼a Kempf, James, ▼d 1952-. |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 세종학술정보원/과학기술실(5층)/ | 청구기호 005.8 J29 w | 등록번호 151361844 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
Approaching wireless Internet security from the position of system architecture, this text describes the cryptographic and protocol-based tools for Internet security with a focus on understanding the system architecture of existing Internet security, and on developing architectural changes for new security services. Introducing the topics of security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for network systems, the author also discusses examples of wireless Internet security systems such as wireless network access control, local IP subnet configuration and address resolution, and location privacy. Each chapter describes the basic network architecture and protocols for the system under consideration, the security threats faced, a functional architecture, and the important Internet protocols that implement the architecture. This is an ideal resource for graduate students of electrical engineering and computer science, as well as for engineers and system architects in the wireless network industry.
This practical, systems architecture-founded approach to the cryptographic and protocol-based tools for Internet security is ideal for students and practitioners.
정보제공 :
