Search the Library Catalogue
| 000 -LEADER | |
|---|---|
| fixed length control field | 01796nam a2200181 4500 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250731b |||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9780849382543 |
| Paper back/Hardbound | hbk |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | eng |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Item number | ZHA |
| 245 ## - TITLE STATEMENT | |
| Title | Security In Wireless Mesh Networks |
| Sub Title | : |
| Statement of responsibility, etc | edited by Yan Zhang, Jun Zheng, Honglin Hu |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication | London |
| Name of publisher | Crc Press |
| Year of publication | 2008 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Number of Pages | xi, 536 p. |
| Dimensions | 24 cm. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc | Includes index |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services. To achieve these aims, security mechanisms are essential to ensure trusted on-going communications.<br/><br/>Security in Wireless Mesh Networks explores key security challenges set in diverse scenarios, as well as emerging standards that include authentication, access control and authorization, attacks, privacy and trust, encryption, key management, identity management, DoS attacks, intrusion detection and prevention, secure routing, and security policies. The book also examines security mechanisms in IEEE 802.11, IEEE 802.15, IEEE 802.16, and IEEE 802.20 standards. In addition, it provides numerous case studies and applications to facilitate understanding.<br/><br/>As a single, comprehensive guide to security-related issues in WMN, this book is an important resource to have if you are working on the design, selection, and implementation of wireless mesh networks and system components. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Computers Internet Security ; Computers Networking Security; Computers Security General |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | Reference |
| Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Cost, normal purchase price | Full call number | Accession Number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Anna Centenary Library | Anna Centenary Library | 3RD FLOOR, A WING | 17.08.2010 | 5438.00 | 005.8 ZHA | 145224 | 31.07.2025 | Reference |