Welcome![Sign In][Sign Up]
Location:
Search - wireless security

Search list

[OtherBulletproof Wireless Security - GSM, UMTS, 802.11, & Ad Hoc Security

Description: Wireless Security is a vast topic and any attempt to address all issues in a single book is a daunting task. It is almost impossible to explain each and every security algorithm that is used in wireless security in detail in a single volume.
Platform: | Size: 2599101 | Author: yeahelton@hotmail.com | Hits:

[matlab802.11Security

Description: Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you ll want this book beside you every step of the way.-Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in Theor y and practice of wireless security, dispelling some of the myths along the way. In do ing so, they provide you with the technical grounding r equired to think about how the rest of the book ap plies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--ba sed systems. you ll want this book beside you every step of the way.
Platform: | Size: 835584 | Author: | Hits:

[Otherwireless_4

Description: 802.11 security(安全).rar 无线应用安全 4-802.11 security (security). Rar Wireless Application Security 4
Platform: | Size: 740352 | Author: chen | Hits:

[Software Engineeringwireless

Description: 无线智能安防系统的方案,可以给大家做安防的人有一些设计经验的分享。-Wireless Intelligent Security Systems program, you can give us security people do have some design experience-sharing.
Platform: | Size: 246784 | Author: 吕海安 | Hits:

[3G developcoco

Description: 无线传感器网络QoS保证技术 无线传感器网络数据融合技术 无线传感器网络安全机制-Wireless sensor network to guarantee QoS technology wireless sensor network data fusion technology wireless sensor network security mechanisms
Platform: | Size: 141312 | Author: coco | Hits:

[Communication802.11i-2004

Description: 802.11i无线安全标准2004修正版-802.11i wireless security standard in 2004 amended version
Platform: | Size: 1356800 | Author: BANQHU | Hits:

[OtherWirelessSecurityEssentials

Description: 无线安全系列的一本好书,国外经典教材,值得一看-Wireless security series of a good book, a classic foreign materials, worth a visit
Platform: | Size: 4512768 | Author: cuiyanzhe | Hits:

[SCMsecurity

Description: 关于无线传感器网络安全性问题的研究进展和相关讨论的论文。-On wireless sensor network security research progress and related discussion papers.
Platform: | Size: 128000 | Author: 苏可 | Hits:

[Otherwireless-security-know-it-all.9781856175296.39185

Description: wireless security book which can be fruitful for guys who is studying courses in security
Platform: | Size: 4450304 | Author: zahid | Hits:

[OtherWireless.Security.GSM.UMTS.802.dot.11

Description: 关于无线安全的一本好书,包括了二代、三代移动通信网络和无线局域网里面的安全协议和算法。-Wireless Security is a vast topic and any attempt to address all issues in a single book is a daunting task. It is almost impossible to explain each and every security algorithm that is used in wireless security in detail in a single volume. In writing this book, I have tried to strike a balance between architectural overviews and minute details. The aim of this book has been to answer questions like: How is wireless security different from security of wireline networks? How has wireless security evolved with changes in wireless networking? What is the architectural philosophy behind the design of wireless security protocols? What are the loopholes in these protocols and how can they be rectified in future designs?
Platform: | Size: 4146176 | Author: 秦中元 | Hits:

[OtherSecurity.and.Quality.of.Service.in.Ad.Hoc.Wireles

Description: it is Security and Quality of Service in Ad Hoc Wireless Networks Mar 2008
Platform: | Size: 2507776 | Author: vamsikrishna | Hits:

[Internet-Network802.11Security

Description: O Reilly出版的有关802.11无线网络安全方面的权威著作,是研究无线网络安全技术人员重要的参考书籍-Reilly published on 802.11 wireless network security authority of the book is to study the wireless network security and technical personnel an important reference book
Platform: | Size: 835584 | Author: matt | Hits:

[Othermanaging-cisco-network-security.9781931836562.240

Description: Managing Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.
Platform: | Size: 5405696 | Author: kinomira | Hits:

[Program docOReilly.802.11.Wireless.Networks.The.Definitive.G

Description: As a network administrator, architect, or security professional, you need to understand the capabilities, limitations, and risks associated with integrating wireless LAN technology into your current infrastructure. This practical guide provides all the information necessary to analyze and deploy wireless networks with confidence. It?s the only source that offers a full spectrum view of 802.11, from the minute details of the specification, to deployment, monitoring, and troubleshooting.
Platform: | Size: 7806976 | Author: MEONGHUN LEE | Hits:

[Other Embeded programRFID-security-system

Description: This project aimed to develop a wireless system to detect and allow only the authorized persons. The system was based on Radio Frequency Identification (RFID) technology and consists of a passive RFID tag. The passive micro transponder tag collects power from the 125 KHz magnetic field generated by the base station, gathers information about the Tag ID and sends this information to the base station. The base station receives, decodes and checks the information available in its Database and Manchester code was used to send those information. The system performed as desired with a 10cm diameter antenna attached to the transponder. The Base Station is built by using the Popular 8051 family Microcontroller. It gets the tag ID and if the tag ID is stored in its memory then the microcontroller will allow the person inside. RFID Reader Module, are also called as interrogators.
Platform: | Size: 111616 | Author: Binu | Hits:

[OtherOnBroadcastAuthenticationinWirelessSensorNetworks.

Description: 无线传感器网络中的广播认证 摘要:广播认证是无线传感器网络安全服务的关键(WSNs)。-Wireless sensor network broadcast authentication Abstract: broadcast authentication in wireless sensor network security services, key (WSNs).
Platform: | Size: 145408 | Author: zj | Hits:

[Software EngineeringMY-Project

Description: Wireless Security based Vehicle authentication System
Platform: | Size: 2630656 | Author: vijay | Hits:

[Software EngineeringWireless-Security

Description: Wireless Security and Cryptography Specifications and Implementations
Platform: | Size: 3180544 | Author: pxpro | Hits:

[Program docWireless-Security-Overview

Description: 无线网络安全方面综述性文献,PDF版,可以参考一下-Wireless Security Overview,for you reference.
Platform: | Size: 216064 | Author: | Hits:

[Software EngineeringWireless-Security-Online

Description: Wireless Security Online Wireless Security Online
Platform: | Size: 45056 | Author: mohammed s | Hits:
« 12 3 4 5 6 7 8 9 10 »

CodeBus www.codebus.net