Klik op een omslag om naar Google Boeken te gaan.
Bezig met laden... Optimizing IEEE 802.11i Resource and Security Essentials: For Mobile and Stationary Devicesdoor Parisa Naraei
Geen Bezig met laden...
Meld je aan bij LibraryThing om erachter te komen of je dit boek goed zult vinden. Op dit moment geen Discussie gesprekken over dit boek. Geen besprekingen geen besprekingen | voeg een bespreking toe
In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired? computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required security. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance. Almost every organization in today's world relies on wireless networks to transmit information, and much of that information should be kept secure. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations.? Security experts of today and tomorrow will learn a lot from Optimizing IEE 802.11i Resources and Security Essentials, and it can be used for master level in computer science, information security, wireless network security and cryptography. The research in this book covers how to best balance security concerns with limited resources available on wireless devices as well as how to optimize security resources on higher-end non-mobile devices Geen bibliotheekbeschrijvingen gevonden. |
Actuele discussiesGeen
Google Books — Bezig met laden... GenresDewey Decimale Classificatie (DDC)005.8Information Computer Science; Knowledge and Systems Computer programming, programs, data, security Computer SecurityLC-classificatieWaarderingGemiddelde: Geen beoordelingen.Ben jij dit?Word een LibraryThing Auteur. |