logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Security For Ubiquitous Computing Frank Stajanoauth David Hutchisoneds

  • SKU: BELL-4311830
Security For Ubiquitous Computing Frank Stajanoauth David Hutchisoneds
$ 31.00 $ 45.00 (-31%)

4.4

22 reviews

Security For Ubiquitous Computing Frank Stajanoauth David Hutchisoneds instant download after payment.

Publisher: Wiley
File Extension: PDF
File size: 14.67 MB
Pages: 267
Author: Frank Stajano(auth.), David Hutchison(eds.)
ISBN: 9780470844939, 9780470848692, 0470844930, 0470848693
Language: English
Year: 2002

Product desciption

Security For Ubiquitous Computing Frank Stajanoauth David Hutchisoneds by Frank Stajano(auth.), David Hutchison(eds.) 9780470844939, 9780470848692, 0470844930, 0470848693 instant download after payment.

* Ubiquitous computing refers to computers embedded in everyday devices communicating with each other over ad-hoc wireless networks
* Focuses on two very hot topics: ad-hoc wireless networking and security
* Covers security issues for well-established and widely used technologies such as GSM, Bluetooth, and IP
* Presents a framework to make sense of the many and varied issues at stake, a taxonomy of the major problems and in-depth discussion of some specific, cutting-edge solutions
* Includes a primer on security and the basics of cryptography
* Describes the security issues in "peer-to-peer networking," a new technology that is gaining prominence in the media with applications such as Napster and ICQ ChatContent:
Chapter 1 Introduction (pages 1–7):
Chapter 2 Ubiquitous Computing (pages 8–59):
Chapter 3 Computer Security (pages 60–84):
Chapter 4 Authentication (pages 85–105):
Chapter 5 Confidentiality (pages 106–122):
Chapter 6 Integrity (pages 123–132):
Chapter 7 Availability (pages 133–151):
Chapter 8 Anonymity (pages 152–165):
Chapter 9 Conclusions (pages 166–168):

Related Products