Security for Mobility
Herausgeber: Mitchell, Chris J.
Security for Mobility
Herausgeber: Mitchell, Chris J.
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book covers many aspects of security for mobility including current developments, underlying technologies, network security, mobile code issues, application security and the future.
Andere Kunden interessierten sich auch für
Susan LandauSurveillance or Security?: The Risks Posed by New Wiretapping Technologies10,99 €
F. GarziaHandbook of Communications Security364,99 €
Internet and Wireless Security147,99 €
Ariel SegallTrusted Platform Modules: Why, When and How to Use Them113,99 €
Anirban SenguptaHigh-Level Synthesis Based Methodologies for Hardware Security, Trust and IP Protection126,99 €
Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation94,99 €
Mike HendrySmart Card Security and Applications110,99 €-
-
-
This book covers many aspects of security for mobility including current developments, underlying technologies, network security, mobile code issues, application security and the future.
Produktdetails
- Produktdetails
- Telecommunications
- Verlag: Institution of Engineering & Technology
- Seitenzahl: 466
- Erscheinungstermin: Dezember 2003
- Englisch
- Abmessung: 234mm x 160mm x 30mm
- Gewicht: 771g
- ISBN-13: 9780863413377
- ISBN-10: 0863413374
- Artikelnr.: 40188414
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Telecommunications
- Verlag: Institution of Engineering & Technology
- Seitenzahl: 466
- Erscheinungstermin: Dezember 2003
- Englisch
- Abmessung: 234mm x 160mm x 30mm
- Gewicht: 771g
- ISBN-13: 9780863413377
- ISBN-10: 0863413374
- Artikelnr.: 40188414
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Part I: Underlying technologies
Chapter 1: Cryptography for mobile security
Chapter 2: PKI in mobile systems
Chapter 3: The personal PKI
Chapter 4: The smartcard as a mobile security device
Chapter 5: Secure mobile tokens - the future
Part II: Network security
Chapter 6: UMTS security
Chapter 7: Securing network access in future mobile systems
Chapter 8: Public key based network access
Chapter 9: Security in personal area networks
Chapter 10: Towards the security of routing in ad hoc networks
Chapter 11: Security issues in a MobileIPv6 network
Part III: Mobile code issues
Chapter 12: Security for agent systems and mobile agents
Chapter 13: Security issues for downloaded code in mobile phones
Part IV: Application security
Chapter 14: Secure mobile commerce
Chapter 15: Securing the delivery of digital content over the Internet
Chapter 16: Security for future standardised DRM
Part V: The future
Chapter 17: Pioneering advanced mobile privacy and security
Chapter 1: Cryptography for mobile security
Chapter 2: PKI in mobile systems
Chapter 3: The personal PKI
Chapter 4: The smartcard as a mobile security device
Chapter 5: Secure mobile tokens - the future
Part II: Network security
Chapter 6: UMTS security
Chapter 7: Securing network access in future mobile systems
Chapter 8: Public key based network access
Chapter 9: Security in personal area networks
Chapter 10: Towards the security of routing in ad hoc networks
Chapter 11: Security issues in a MobileIPv6 network
Part III: Mobile code issues
Chapter 12: Security for agent systems and mobile agents
Chapter 13: Security issues for downloaded code in mobile phones
Part IV: Application security
Chapter 14: Secure mobile commerce
Chapter 15: Securing the delivery of digital content over the Internet
Chapter 16: Security for future standardised DRM
Part V: The future
Chapter 17: Pioneering advanced mobile privacy and security
Part I: Underlying technologies
Chapter 1: Cryptography for mobile security
Chapter 2: PKI in mobile systems
Chapter 3: The personal PKI
Chapter 4: The smartcard as a mobile security device
Chapter 5: Secure mobile tokens - the future
Part II: Network security
Chapter 6: UMTS security
Chapter 7: Securing network access in future mobile systems
Chapter 8: Public key based network access
Chapter 9: Security in personal area networks
Chapter 10: Towards the security of routing in ad hoc networks
Chapter 11: Security issues in a MobileIPv6 network
Part III: Mobile code issues
Chapter 12: Security for agent systems and mobile agents
Chapter 13: Security issues for downloaded code in mobile phones
Part IV: Application security
Chapter 14: Secure mobile commerce
Chapter 15: Securing the delivery of digital content over the Internet
Chapter 16: Security for future standardised DRM
Part V: The future
Chapter 17: Pioneering advanced mobile privacy and security
Chapter 1: Cryptography for mobile security
Chapter 2: PKI in mobile systems
Chapter 3: The personal PKI
Chapter 4: The smartcard as a mobile security device
Chapter 5: Secure mobile tokens - the future
Part II: Network security
Chapter 6: UMTS security
Chapter 7: Securing network access in future mobile systems
Chapter 8: Public key based network access
Chapter 9: Security in personal area networks
Chapter 10: Towards the security of routing in ad hoc networks
Chapter 11: Security issues in a MobileIPv6 network
Part III: Mobile code issues
Chapter 12: Security for agent systems and mobile agents
Chapter 13: Security issues for downloaded code in mobile phones
Part IV: Application security
Chapter 14: Secure mobile commerce
Chapter 15: Securing the delivery of digital content over the Internet
Chapter 16: Security for future standardised DRM
Part V: The future
Chapter 17: Pioneering advanced mobile privacy and security







