 |
|
 802.11 Security
802.11 Security covers the entire process of building secure 802.11-based wireless networks, in particular, the 802.11b ("Wi-Fi") specification. The authors provide detailed coverage of security issues unique to wireless networking, such as Wireless Access Points (WAP), bandwidth stealing, and the problematic Wired Equivalent... |  |  Network Security: A Decision and Game-Theoretic Approach
Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of... |  |  How to Do Everything MacBook
Easy-to-follow coverage of portable Macs, including the MacBook, MacBook Pro, and MacBook Air
How to Do Everything: MacBook strongly emphasizes the portability and other unique features of the laptop versions of the Mac, examining ports and jacks, discussing user accounts and privacy, managing multiple network connections,... |
|
|
 Identity Management: Concepts, Technologies, and Systems
Digital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enhancing the network user experience, protecting privacy, underpinning accountability in transactions and interactions, and... |  |  Security Engineering: A Guide to Building Dependable Distributed Systems
For generations, people have defined and protected their property and their privacy using locks, fences, signatures, seals, account books, and meters. These have been supported by a host of social constructs ranging from international treaties through national laws to manners and customs.
This is changing, and quickly. Most records... |  |  |
|
 RFID Systems: Research Trends and Challenges
This book provides an insight into the 'hot' field of Radio Frequency Identification (RFID) Systems
In this book, the authors provide an insight into the field of RFID systems with an emphasis on networking aspects and research challenges related to passive Ultra High Frequency (UHF) RFID systems. The book reviews... |  |  Understanding Voice over IP Security (Artech House Telecommunications Library)
VoIP is poised to take over from the century-old public switched telephone network (PSTN). But VoIP telephony does not enjoy the same privacy as the old PSTN. This is because PSTN phone calls were based on establishing a “closed circuit” between the two parties, while VoIP phone calls send packets through the Internet, which... |  |  RESTful Rails Development: Building Open Applications and Services
The Web is slowly but surely changing from a model in which a human reader browses content on web pages to a model in which services and clients (not necessarily humans) exchange information. And because of this, author Silvia Puglisi explains, it makes more sense to build platforms instead of just products or applications. Platforms... |
|
| Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 |