Security for Ubiquitous Computing
(Sprache: Englisch)
* Ubiquitous computing refers to computers embedded in everyday devices communicating with each other over ad-hoc wireless networks
* Focuses on two very hot topics: ad-hoc wireless networking and security
* Covers security issues for well-established and...
* Focuses on two very hot topics: ad-hoc wireless networking and security
* Covers security issues for well-established and...
Leider schon ausverkauft
versandkostenfrei
Buch (Gebunden)
142.00 €
Produktdetails
Produktinformationen zu „Security for Ubiquitous Computing “
Klappentext zu „Security for Ubiquitous Computing “
* Ubiquitous computing refers to computers embedded in everyday devices communicating with each other over ad-hoc wireless networks* Focuses on two very hot topics: ad-hoc wireless networking and security
* Covers security issues for well-established and widely used technologies such as GSM, Bluetooth, and IP
* Presents a framework to make sense of the many and varied issues at stake, a taxonomy of the major problems and in-depth discussion of some specific, cutting-edge solutions
* Includes a primer on security and the basics of cryptography
* Describes the security issues in "peer-to-peer networking," a new technology that is gaining prominence in the media with applications such as Napster and ICQ Chat
Inhaltsverzeichnis zu „Security for Ubiquitous Computing “
About the Author.Forward.Preface.Acknowledgements.Contact Information.1. Introduction.Scenario.Essential terminology.Problems.Notation.2. Ubiquitous computing.Xerox PARC.Norman's Invisible Computer.MIT.HP's Cooltown.ORL/AT&T Labs Cambridge.Security issues.3. Computer security.Confidentiality.Integrity.Availability.Authentication.Security policies.4. Authentication.New preconditions.The Resurrecting Duckling security policy model.The many ways of being a master.5. Confidentiality.Cryptographic primitives for peanut processors.Personal privacy.6. Integrity.Message integrity.Device integrity.7. Availability.Threats to the communications channel.Threats to the battery energy.Threats from mobile code.8. Anonymity.The Cocaine Auction Protocol.The anonymity layer.9. Conclusions.Appendix A: A Short Primer on Functions.Appendix B: Existing Network Security Solutions.Annotated bibliography.Index.
Bibliographische Angaben
- Autor: Frank Stajano
- 2002, 1. Auflage, XX, 248 Seiten, mit Abbildungen, Maße: 17,5 x 25 cm, Gebunden, Englisch
- Verlag: Wiley & Sons
- ISBN-10: 0470844930
- ISBN-13: 9780470844939
- Erscheinungsdatum: 15.03.2002
Sprache:
Englisch
Rezension zu „Security for Ubiquitous Computing “
"...a remarkably readable introduction to the topic...rich in background material." (IEEE Network, New Books & Multimedia Column, November 2002)
Pressezitat
"...a remarkably readable introduction to the topic...rich in background material." ( IEEE Network , New Books & Multimedia Column, November 2002)
Kommentar zu "Security for Ubiquitous Computing"
0 Gebrauchte Artikel zu „Security for Ubiquitous Computing“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Security for Ubiquitous Computing".
Kommentar verfassen