AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services.
AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its...
Steganography and steganalysis, the hiding and detection of a covert payload
within an innocent cover object, started to receive attention from the computer
science, engineering, and mathematics communities in the 1990s. At
first the problems were not clearly defined, but proper statistical foundations
were proposed and mathematical...
"...this volume represents a real mine of information...anyone working in the field would benefit from owning a copy." IEEE Communications Engineer
Embedded network systems (ENS) provide a set of technologies that can link the physical world to large-scale networks in applications, such as monitoring of borders,...
This is not a book that tells you what you should or shouldn’t do! So, in the immortal words of Douglas Adams (www.douglasadams.com): “Don’t Panic!” Yes, it is a book on standards, but the standards are not presented as a set of rules; rather, they are presented and explained as a catalog of standard practices...
A breakthrough on today’s fastest growing artificial intelligence technique
Many of today’s engineering and business computer applications require decisions to be made on the basis of uncertain or incomplete information, a phenomenon that has resulted in the development of case-based reasoning, a powerful computing technique by...
This expanded and updated second edition of a classic bestseller continues to take the "mystery" out of designing and analyzing algorithms and their efficacy and efficiency. Expanding on the highly successful formula of the first edition, the book now serves as the primary textbook of choice for any algorithm design course while...
A Systems Engineering Approach to Wireless Information Networks
The Second Edition of this internationally respected textbook brings readers fully up to date with the myriad of developments in wireless communications. When first published in 1995, wireless communications was synonymous...
Solving modern biological problems requires advanced computational methods. Bioinformatics evolved from the active interaction of two fast-developing disciplines, biology and information technology. The central issue of this emerging field is the transformation of often distributed and unstructured biological data into meaningful information....
"Real 802.11 Security provides clear descriptions of current and emerging security techniques. The authors handle complex topics nicely, and offer significant clarification of IEEE draft standards." -Russ Housley, IETF Security Area Director and founder of Vigil Security, LLC
Fundamentals of Database Systems combines clear explanations of theory and design, broad coverage of models and real systems, and excellent examples with up-to-date introductions to modern database technologies. This edition is completely revised and updated, and reflects the latest trends in technological and application development....
Introducing the long-awaited first step to personal privacy on the Web!
Privacy on the Internet is a very complicated–and delicate–subject. It is about making sure that sites are honest with the people using their services, and providing the end user with the choice of whether or not to share information with the original server....
Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities.
Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers,...