SFr. 79.00
€ 79.00
BTC 0.0112
LTC 1.043
ETH 0.1796


bestellen

Artikel-Nr. 17045964


Diesen Artikel in meine
Wunschliste
Diesen Artikel
weiterempfehlen
Diesen Preis
beobachten

Weitersagen:




Autor(en): 
  • Iraj Sadegh Amiri
  • Optimizing IEEE 802.11i Resource and Security Essentials 
     

    (Buch)
    Dieser Artikel gilt, aufgrund seiner Grösse, beim Versand als 2 Artikel!


    Übersicht
     
    Lieferstatus:   i.d.R. innert 14-24 Tagen versandfertig
    Genre:  EDV / Informatik 
    ISBN:  9780128022221 
    EAN-Code: 
    9780128022221 
    Verlag:  Syngress Media 
    Einband:  Kartoniert  
    Sprache:  English  
    Dimensionen:  H 229 mm / B 152 mm / D 3 mm 
    Gewicht:  107 gr 
    Zus. Info: 
    Bewertung: Titel bewerten / Meinung schreiben
    Inhalt:
    In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required security. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance. Almost every organization in today's world relies on wireless networks to transmit information, and much of that information should be kept secure. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations. Security experts of today and tomorrow will learn a lot from Optimizing IEE 802.1 1i Resources and Security Essentials, and it can be used for master level in computer science, information security, wireless network security and cryptography. The research in this book covers how to best balance security concerns with limited resources available on wireless devices as well as how to optimize security resources on higher-end non-mobile devices.

      




    Wird aktuell angeschaut...
     

    Zurück zur letzten Ansicht


    AGB | Datenschutzerklärung | Mein Konto | Impressum | Partnerprogramm
    Newsletter | 1Advd.ch RSS News-Feed Newsfeed | 1Advd.ch Facebook-Page Facebook | 1Advd.ch Google Plus-Page Google+ | 1Advd.ch Twitter-Page Twitter
    Forbidden Planet AG © 1999-2018
    Alle Angaben ohne Gewähr
     
    SUCHEN

     
     Kategorien
    Im Sortiment stöbern
    Genres
    Hörbücher
    Aktionen
     Infos
    Mein Konto
    Warenkorb
    Meine Wunschliste
     Kundenservice
    Recherchedienst
    Fragen / AGB / Kontakt
    Partnerprogramm
    Impressum
    © by Forbidden Planet AG 1999-2018