Search the Library Catalogue
000 -LEADER | |
---|---|
fixed length control field | 02343nam a22002297a 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250806b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9780521873710 |
Paper back/Hardbound | hbk |
041 ## - LANGUAGE CODE | |
Language code of text/sound track or separate title | eng |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Item number | BUT |
100 ## - MAIN ENTRY--AUTHOR NAME | |
Personal name | Buttyán, Levente |
245 ## - TITLE STATEMENT | |
Title | Security And Cooperation In Wireless Networks |
Sub Title | : thwarting malicious and selfish behavior in the age of ubiquitous computing |
Statement of responsibility, etc | Levente Buttyán, Jean-Pierre Hubaux |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication | Cambridge |
Name of publisher | Cambridge University Press |
Year of publication | 2008 |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | xvii, 485 pages |
Other physical details | ill. |
Dimensions | 25 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographies and index |
520 ## - SUMMARY, ETC. | |
Summary, etc | As wireless networking becomes almost ubiquitous, it is important to anticipate potential malicious and selfish misdeeds. This self-contained text is the first to provide a scholarly description of security and non-cooperative behavior in wireless networks." "The major networking trends are analyzed and their implications explained in terms of security and cooperation. Key problems such as cheating with identities, illegitimate access to confidential data, attacks against privacy and "stealing of bandwidth" are described along with the existing security techniques and putative methods of protection for the future. The fundamental questions of security: user and device identification; establishment of security associations; secure and cooperative routing in multi-hop network; fair bandwidth distribution; privacy protection, and so on, are approached from a theoretical perspective and supported by real-world examples including ad hoc, mesh, vehicular, sensor and RFID networks. The important relationships between trust, security, and cooperation are also discussed." "End of chapter homework problems test the reader and open new directions of thought; and two tutorials in the appendices, on cryptographic protocols and game theory, provide a review of the background material required to grasp the core concepts." "Ideal for senior undergraduates and graduate students of electrical engineering and computer science, this book will also be an invaluable resource on thwarting malicious and selfish behavior for researchers and practitioners in the wireless industry. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Omputer Security |
Topical Term | computer networks Security measures |
Topical Term | Computer crimes |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Hubaux, Jean-pierre |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Reference |
Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Full call number | Accession Number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
Anna Centenary Library | Anna Centenary Library | 3RD FLOOR, A WING | 28.07.2010 | 005.8 BUT | 95726 | 06.08.2025 | Reference |