Description |
1 online resource (xvi, 52 pages) : illustrations |
|
text txt rdacontent |
|
computer c rdamedia |
|
online resource cr rdacarrier |
Summary |
The research in this book covers how to best balance security concerns with limited resources available on wireless devices as well as how to optimize security resources on higher-end non-mobile devices. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations. Security experts of today and tomorrow will learn a lot from this resource and it can be used for master level in computer science, information security, wireless network security and cryptography. -- Edited summary from book. |
Bibliography |
Includes bibliographical references. |
Note |
Print version record. |
Subject |
Computer security -- Software.
|
|
Sécurité informatique -- Logiciels.
|
|
COMPUTERS -- Networking -- Security.
|
|
Computer security
|
Genre/Form |
Software
|
Added Author |
Amiri, Iraj Sadegh, 1977- author.
|
|
Saberi, Iman, author.
|
|
Yu, James, technical editor.
|
Other Form: |
Print version: Amiri, I.S. Optimizing IEEE 802.11i Resource and Security Essentials : For Mobile and Stationary Devices. Burlington : Elsevier Science, ©2014 9780128022221 |
ISBN |
9780128022238 (electronic bk.) |
|
012802223X (electronic bk.) |
|
9780128022221 |
|
0128022221 |
Standard No. |
CHNEW 000889689 |
|
CHNEW 001001095 |
|
CHNEW 001026545 |
|
DEBBG BV043615711 |
|
DEBSZ 431869170 |
|
DEBSZ 434137774 |
|