Search results for ""Author Hakima Chaouchi""
ISTE Ltd and John Wiley & Sons Inc The Internet of Things: Connecting Objects to the Web
Internet of Things: Connecting Objects puts forward the technologies and the networking architectures which make it possible to support the Internet of Things. Amongst these technologies, RFID, sensor and PLC technologies are described and a clear view on how they enable the Internet of Things is given. This book also provides a good overview of the main issues facing the Internet of Things such as the issues of privacy and security, application and usage, and standardization.
£138.95
ISTE Ltd and John Wiley & Sons Inc Wireless and Mobile Network Security
This book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with coverage of the basic security concepts and fundamentals which underpin and provide the knowledge necessary for understanding and evaluating security issues, challenges, and solutions. This material will be of invaluable use to all those working in the network security field, and especially to the many people entering the field. The next area of focus is on the security issues and available solutions associated with off-the-shelf wireless and mobile technologies such as Bluetooth, WiFi, WiMax, 2G, and 3G. There is coverage of the security techniques used to protect applications downloaded by mobile terminals through mobile cellular networks, and finally the book addresses security issues and solutions in emerging wireless and mobile technologies such as ad hoc and sensor networks, cellular 4G and IMS networks.
£309.95
World Scientific Publishing Co Pte Ltd Mobile And Wireless Networks Security - Proceedings Of The Mwns 2008 Workshop
Wireless and mobile networks have undergone a tremendous evolution since their start. This was mainly motivated by the need for connectivity everywhere, as exemplified by the philosophy of “always on” access. Mobile telephony was the first need felt by users, followed by the need for mobile Internet applications. Mobile telecommunications networks were the first concretization of mobile telephony, followed by a set of wireless technologies with or without embedded mobility and with or without infrastructure. Obviously, this large deployment of services over mobile and wireless networks is not easy from a network security point of view. This book presents selected up-to-date research on security in wireless and mobile environments, mainly WiFi and self-organized networks such as ad-hoc networks. The selected research work was peer-reviewed and presented at the Mobile and Wireless Networks Security (MWNS) 2008 Workshop in Singapore.
£71.00