Other available formats:
Looking for an examination copy?
This title is not currently available for examination. However, if you are interested in the title for your course we can consider offering an examination copy. To register your interest please contact email@example.com providing details of the course you are teaching.
In describing tools for internet security, this title focuses on understanding the system architecture of existing security and on developing architectural changes for new security services. Topics include security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for network systems. Kempf also discusses examples of wireless Internet security systems such as wireless network access control, local IP subnet configuration and address resolution, and location privacy. Each chapter describes the basic network architecture and protocols for the system under consideration, security threats, functional architecture, and the important internet protocols that implement the architecture. This is an ideal resource for graduate students of electrical engineering and computer science, as well as for engineers and system architects in the wireless network industry.Read more
- Deals with the practical design aspects of wireless security systems rather than specific standards
- Focus is on developing architectural changes for new security services
- Examples of cryptographic algorithms are included, and examples of wireless Internet security systems are discussed
Be the first to review this book
- Date Published: October 2008
- format: Hardback
- isbn: 9780521887830
- length: 224 pages
- dimensions: 253 x 177 x 16 mm
- weight: 0.6kg
- availability: In stock
Table of Contents
1. Security basics
2. Network system architecture basics
3. Cryptographic algorithms and security primitives
4. Wireless IP network access control
5. Local subnet configuration and address resolution
6. Security for global IP mobility
7. Location privacy.
You are now leaving the Cambridge University Press website, your eBook purchase and download will be completed by our partner www.ebooks.com. Please see the permission section of the www.ebooks.com catalogue page for details of the print & copy limits on our eBooks.Continue ×