Security for wireless ad hoc networks

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Anjum, Farooq (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Hoboken, N.J. Wiley-Interscience ©2007
Schlagworte:
Online-Zugang:DE-1046
DE-1047
Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV043163149
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 151126s2007 xx o|||| 00||| eng d
020 |a 0470118466  |c electronic bk.  |9 0-470-11846-6 
020 |a 0470118474  |9 0-470-11847-4 
020 |a 0471756881  |9 0-471-75688-1 
020 |a 9780470118467  |c electronic bk.  |9 978-0-470-11846-7 
020 |a 9780470118474  |9 978-0-470-11847-4 
020 |a 9780471756880  |9 978-0-471-75688-0 
035 |a (OCoLC)86107727 
035 |a (DE-599)BVBBV043163149 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
049 |a DE-1046  |a DE-1047 
082 0 |a 005.8  |2 22 
100 1 |a Anjum, Farooq  |e Verfasser  |4 aut 
245 1 0 |a Security for wireless ad hoc networks  |c Farooq Anjum and Petros Mouchtaris 
264 1 |a Hoboken, N.J.  |b Wiley-Interscience  |c ©2007 
300 |a 1 Online-Ressource (xv, 247 pages) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Includes bibliographical references (pages 234-244) and index 
500 |a Cover -- TOC36;Contents -- Preface -- Foreword -- Acknowledgments -- CH36;1 Introduction -- 146;1 Definition of Wireless Ad Hoc Networks -- 146;2 Applications of Wireless Ad Hoc Networks -- 146;3 Threats44; Attacks44; and Vulnerabilities -- 146;346;1 Threats -- 146;346;2 Vulnerabilities in Ad Hoc Networks -- 146;346;3 Attacks -- 146;4 Overview of the Book -- CH36;2 Basic Security Concepts -- 246;1 Introduction -- 246;2 Basic Concepts -- 246;246;1 Attributes -- 246;246;2 Cryptographic Primitives -- 246;3 Modes of Operation -- 246;4 Miscellaneous Properties -- 246;446;1 One45;Way Property of Hash Chains -- 246;446;2 TESLA -- 246;5 Summary -- CH36;3 Key Management -- 346;1 Introduction -- 346;2 Traditional Solution -- 346;3 Solutions for Ad Hoc Networks -- 346;346;1 Asymmetric Key45;Based Approach -- 346;346;2 Symmetric Key45;Based Approach -- 346;4 Summary -- CH36;4 Secure Routing -- 446;1 Introduction -- 446;146;1 Distance45;Vector and Link45;State Routing --  
500 |a  - 446;146;2 Proactive vs Reactive Routing -- 446;2 Ad Hoc On45;Demand Distance Vector -- 446;246;1 Secure AODV -- 446;246;2 Authenticated Routing for Ad Hoc Networks 40;ARAN41; -- 446;246;3 Security45;Aware Ad Hoc Routing -- 446;3 Dynamic Source Routing Protocol -- 446;346;1 Secure Routing Protocol -- 446;346;2 Ariadne -- 446;346;3 EndairA58; A Provably Secure Routing Protocol -- 446;4 Destination45;Sequenced Distance45;Vector Routing Protocol -- 446;446;1 Secure Efficient Distance Vector Routing 40;SEAD41; -- 446;446;2 SuperSEAD -- 446;446;3 S45;DSDV -- 446;5 Optimized Link45;State Routing Protocol -- 446;546;1 Secure Extension to OLSR -- 446;546;2 Secure Link45;State Routing Protocol -- 446;6 Anonymous Routing Protocols -- 446;646;1 ANODR -- 446;646;2 MASK -- 446;7 Generic Attacks Against Routing -- 446;746;1 Wormhole Attacks -- 446;746;2 Rushing Attacks -- 446;746;3 Sybil Attacks -- 446;8 Summary -- CH36;5 Intrusion Detection Systems -- 546;1 Introduction --  
500 |a  - 546;146;1 Traditional IDS Systems -- 546;2 Unique IDS Challenges in MANET -- 546;3 Threat Model -- 546;4 Architecture for Intrusion Detection in MANET -- 546;446;1 Noncollaborative Intrusion Detection System -- 546;446;2 Cooperative Intrusion Detection -- 546;446;3 Key Novel Concepts for Cooperative Intrusion Detection in MANET -- 546;5 Evidence Collection -- 546;546;1 Local Evidence -- 546;546;2 Promiscuous Monitoring -- 546;546;3 Evidence made Available by Other Nodes -- 546;6 Detection of Specific Attacks -- 546;646;1 Detection of Packet Dropping Attacks -- 546;646;2 Detection of Attacks Against Routing Protocols -- 546;7 Summary -- CH36;6 Policy Management -- 646;1 Introduction -- 646;2 Policy45;Based Network Management -- 646;246;1 Overview -- 646;246;2 Architecture -- 646;246;3 Policy Languages -- 646;246;4 Distributed Policy Management Architecture -- 646;246;5 IETF and DMTF Standardization Activities -- 646;3 Application of Policy Management to Security Management --  
500 |a  - 646;346;1 Role45;Based Access Control 40;RBAC41; -- 646;346;2 Trust Management and the KeyNote System -- 646;346;3 Firewall Management -- 646;346;4 
500 |a This book addresses the problems and brings solutions to the security issues of ad-hoc networks. Topics included are threat attacks and vulnerabilities, basic cryptography mechanisms, authentication, secure routing, firewalls, security policy management, and future developments. An Instructor Support FTP site is available from the Wiley editorial board 
650 7 |a COMPUTERS / Internet / Security  |2 bisacsh 
650 7 |a COMPUTERS / Networking / Security  |2 bisacsh 
650 7 |a COMPUTERS / Security / General  |2 bisacsh 
650 7 |a Wireless LANs / Security measures  |2 fast 
650 4 |a Wireless LANs  |x Security measures 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Drahtloses lokales Netz  |0 (DE-588)4633975-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Ad-hoc-Netz  |0 (DE-588)4674811-8  |2 gnd  |9 rswk-swf 
689 0 0 |a Drahtloses lokales Netz  |0 (DE-588)4633975-9  |D s 
689 0 1 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 2 |a Ad-hoc-Netz  |0 (DE-588)4674811-8  |D s 
689 0 |8 1\p  |5 DE-604 
700 1 |a Mouchtaris, Petros  |e Sonstige  |4 oth 
856 4 0 |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=186646  |x Aggregator  |3 Volltext 
912 |a ZDB-4-EBA 
883 1 |8 1\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
943 1 |a oai:aleph.bib-bvb.de:BVB01-028587340 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=186646  |l DE-1046  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=186646  |l DE-1047  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 

Datensatz im Suchindex

_version_ 1819295537664360448
any_adam_object
author Anjum, Farooq
author_facet Anjum, Farooq
author_role aut
author_sort Anjum, Farooq
author_variant f a fa
building Verbundindex
bvnumber BV043163149
collection ZDB-4-EBA
ctrlnum (OCoLC)86107727
(DE-599)BVBBV043163149
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05963nam a2200613zc 4500</leader><controlfield tag="001">BV043163149</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2007 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470118466</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-470-11846-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470118474</subfield><subfield code="9">0-470-11847-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0471756881</subfield><subfield code="9">0-471-75688-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470118467</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-470-11846-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470118474</subfield><subfield code="9">978-0-470-11847-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780471756880</subfield><subfield code="9">978-0-471-75688-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)86107727</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043163149</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Anjum, Farooq</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security for wireless ad hoc networks</subfield><subfield code="c">Farooq Anjum and Petros Mouchtaris</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, N.J.</subfield><subfield code="b">Wiley-Interscience</subfield><subfield code="c">©2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xv, 247 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 234-244) and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover -- TOC36;Contents -- Preface -- Foreword -- Acknowledgments -- CH36;1 Introduction -- 146;1 Definition of Wireless Ad Hoc Networks -- 146;2 Applications of Wireless Ad Hoc Networks -- 146;3 Threats44; Attacks44; and Vulnerabilities -- 146;346;1 Threats -- 146;346;2 Vulnerabilities in Ad Hoc Networks -- 146;346;3 Attacks -- 146;4 Overview of the Book -- CH36;2 Basic Security Concepts -- 246;1 Introduction -- 246;2 Basic Concepts -- 246;246;1 Attributes -- 246;246;2 Cryptographic Primitives -- 246;3 Modes of Operation -- 246;4 Miscellaneous Properties -- 246;446;1 One45;Way Property of Hash Chains -- 246;446;2 TESLA -- 246;5 Summary -- CH36;3 Key Management -- 346;1 Introduction -- 346;2 Traditional Solution -- 346;3 Solutions for Ad Hoc Networks -- 346;346;1 Asymmetric Key45;Based Approach -- 346;346;2 Symmetric Key45;Based Approach -- 346;4 Summary -- CH36;4 Secure Routing -- 446;1 Introduction -- 446;146;1 Distance45;Vector and Link45;State Routing -- </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a"> - 446;146;2 Proactive vs Reactive Routing -- 446;2 Ad Hoc On45;Demand Distance Vector -- 446;246;1 Secure AODV -- 446;246;2 Authenticated Routing for Ad Hoc Networks 40;ARAN41; -- 446;246;3 Security45;Aware Ad Hoc Routing -- 446;3 Dynamic Source Routing Protocol -- 446;346;1 Secure Routing Protocol -- 446;346;2 Ariadne -- 446;346;3 EndairA58; A Provably Secure Routing Protocol -- 446;4 Destination45;Sequenced Distance45;Vector Routing Protocol -- 446;446;1 Secure Efficient Distance Vector Routing 40;SEAD41; -- 446;446;2 SuperSEAD -- 446;446;3 S45;DSDV -- 446;5 Optimized Link45;State Routing Protocol -- 446;546;1 Secure Extension to OLSR -- 446;546;2 Secure Link45;State Routing Protocol -- 446;6 Anonymous Routing Protocols -- 446;646;1 ANODR -- 446;646;2 MASK -- 446;7 Generic Attacks Against Routing -- 446;746;1 Wormhole Attacks -- 446;746;2 Rushing Attacks -- 446;746;3 Sybil Attacks -- 446;8 Summary -- CH36;5 Intrusion Detection Systems -- 546;1 Introduction -- </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a"> - 546;146;1 Traditional IDS Systems -- 546;2 Unique IDS Challenges in MANET -- 546;3 Threat Model -- 546;4 Architecture for Intrusion Detection in MANET -- 546;446;1 Noncollaborative Intrusion Detection System -- 546;446;2 Cooperative Intrusion Detection -- 546;446;3 Key Novel Concepts for Cooperative Intrusion Detection in MANET -- 546;5 Evidence Collection -- 546;546;1 Local Evidence -- 546;546;2 Promiscuous Monitoring -- 546;546;3 Evidence made Available by Other Nodes -- 546;6 Detection of Specific Attacks -- 546;646;1 Detection of Packet Dropping Attacks -- 546;646;2 Detection of Attacks Against Routing Protocols -- 546;7 Summary -- CH36;6 Policy Management -- 646;1 Introduction -- 646;2 Policy45;Based Network Management -- 646;246;1 Overview -- 646;246;2 Architecture -- 646;246;3 Policy Languages -- 646;246;4 Distributed Policy Management Architecture -- 646;246;5 IETF and DMTF Standardization Activities -- 646;3 Application of Policy Management to Security Management -- </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a"> - 646;346;1 Role45;Based Access Control 40;RBAC41; -- 646;346;2 Trust Management and the KeyNote System -- 646;346;3 Firewall Management -- 646;346;4</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This book addresses the problems and brings solutions to the security issues of ad-hoc networks. Topics included are threat attacks and vulnerabilities, basic cryptography mechanisms, authentication, secure routing, firewalls, security policy management, and future developments. An Instructor Support FTP site is available from the Wiley editorial board</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless LANs / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless LANs</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ad-hoc-Netz</subfield><subfield code="0">(DE-588)4674811-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Ad-hoc-Netz</subfield><subfield code="0">(DE-588)4674811-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mouchtaris, Petros</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=186646</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028587340</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=186646</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=186646</subfield><subfield code="l">DE-1047</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV043163149
illustrated Not Illustrated
indexdate 2024-12-24T04:43:47Z
institution BVB
isbn 0470118466
0470118474
0471756881
9780470118467
9780470118474
9780471756880
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-028587340
oclc_num 86107727
open_access_boolean
owner DE-1046
DE-1047
owner_facet DE-1046
DE-1047
physical 1 Online-Ressource (xv, 247 pages)
psigel ZDB-4-EBA
ZDB-4-EBA FAW_PDA_EBA
publishDate 2007
publishDateSearch 2007
publishDateSort 2007
publisher Wiley-Interscience
record_format marc
spelling Anjum, Farooq Verfasser aut
Security for wireless ad hoc networks Farooq Anjum and Petros Mouchtaris
Hoboken, N.J. Wiley-Interscience ©2007
1 Online-Ressource (xv, 247 pages)
txt rdacontent
c rdamedia
cr rdacarrier
Includes bibliographical references (pages 234-244) and index
Cover -- TOC36;Contents -- Preface -- Foreword -- Acknowledgments -- CH36;1 Introduction -- 146;1 Definition of Wireless Ad Hoc Networks -- 146;2 Applications of Wireless Ad Hoc Networks -- 146;3 Threats44; Attacks44; and Vulnerabilities -- 146;346;1 Threats -- 146;346;2 Vulnerabilities in Ad Hoc Networks -- 146;346;3 Attacks -- 146;4 Overview of the Book -- CH36;2 Basic Security Concepts -- 246;1 Introduction -- 246;2 Basic Concepts -- 246;246;1 Attributes -- 246;246;2 Cryptographic Primitives -- 246;3 Modes of Operation -- 246;4 Miscellaneous Properties -- 246;446;1 One45;Way Property of Hash Chains -- 246;446;2 TESLA -- 246;5 Summary -- CH36;3 Key Management -- 346;1 Introduction -- 346;2 Traditional Solution -- 346;3 Solutions for Ad Hoc Networks -- 346;346;1 Asymmetric Key45;Based Approach -- 346;346;2 Symmetric Key45;Based Approach -- 346;4 Summary -- CH36;4 Secure Routing -- 446;1 Introduction -- 446;146;1 Distance45;Vector and Link45;State Routing --
- 446;146;2 Proactive vs Reactive Routing -- 446;2 Ad Hoc On45;Demand Distance Vector -- 446;246;1 Secure AODV -- 446;246;2 Authenticated Routing for Ad Hoc Networks 40;ARAN41; -- 446;246;3 Security45;Aware Ad Hoc Routing -- 446;3 Dynamic Source Routing Protocol -- 446;346;1 Secure Routing Protocol -- 446;346;2 Ariadne -- 446;346;3 EndairA58; A Provably Secure Routing Protocol -- 446;4 Destination45;Sequenced Distance45;Vector Routing Protocol -- 446;446;1 Secure Efficient Distance Vector Routing 40;SEAD41; -- 446;446;2 SuperSEAD -- 446;446;3 S45;DSDV -- 446;5 Optimized Link45;State Routing Protocol -- 446;546;1 Secure Extension to OLSR -- 446;546;2 Secure Link45;State Routing Protocol -- 446;6 Anonymous Routing Protocols -- 446;646;1 ANODR -- 446;646;2 MASK -- 446;7 Generic Attacks Against Routing -- 446;746;1 Wormhole Attacks -- 446;746;2 Rushing Attacks -- 446;746;3 Sybil Attacks -- 446;8 Summary -- CH36;5 Intrusion Detection Systems -- 546;1 Introduction --
- 546;146;1 Traditional IDS Systems -- 546;2 Unique IDS Challenges in MANET -- 546;3 Threat Model -- 546;4 Architecture for Intrusion Detection in MANET -- 546;446;1 Noncollaborative Intrusion Detection System -- 546;446;2 Cooperative Intrusion Detection -- 546;446;3 Key Novel Concepts for Cooperative Intrusion Detection in MANET -- 546;5 Evidence Collection -- 546;546;1 Local Evidence -- 546;546;2 Promiscuous Monitoring -- 546;546;3 Evidence made Available by Other Nodes -- 546;6 Detection of Specific Attacks -- 546;646;1 Detection of Packet Dropping Attacks -- 546;646;2 Detection of Attacks Against Routing Protocols -- 546;7 Summary -- CH36;6 Policy Management -- 646;1 Introduction -- 646;2 Policy45;Based Network Management -- 646;246;1 Overview -- 646;246;2 Architecture -- 646;246;3 Policy Languages -- 646;246;4 Distributed Policy Management Architecture -- 646;246;5 IETF and DMTF Standardization Activities -- 646;3 Application of Policy Management to Security Management --
- 646;346;1 Role45;Based Access Control 40;RBAC41; -- 646;346;2 Trust Management and the KeyNote System -- 646;346;3 Firewall Management -- 646;346;4
This book addresses the problems and brings solutions to the security issues of ad-hoc networks. Topics included are threat attacks and vulnerabilities, basic cryptography mechanisms, authentication, secure routing, firewalls, security policy management, and future developments. An Instructor Support FTP site is available from the Wiley editorial board
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Wireless LANs / Security measures fast
Wireless LANs Security measures
Computersicherheit (DE-588)4274324-2 gnd rswk-swf
Drahtloses lokales Netz (DE-588)4633975-9 gnd rswk-swf
Ad-hoc-Netz (DE-588)4674811-8 gnd rswk-swf
Drahtloses lokales Netz (DE-588)4633975-9 s
Computersicherheit (DE-588)4274324-2 s
Ad-hoc-Netz (DE-588)4674811-8 s
1\p DE-604
Mouchtaris, Petros Sonstige oth
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=186646 Aggregator Volltext
1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
spellingShingle Anjum, Farooq
Security for wireless ad hoc networks
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Wireless LANs / Security measures fast
Wireless LANs Security measures
Computersicherheit (DE-588)4274324-2 gnd
Drahtloses lokales Netz (DE-588)4633975-9 gnd
Ad-hoc-Netz (DE-588)4674811-8 gnd
subject_GND (DE-588)4274324-2
(DE-588)4633975-9
(DE-588)4674811-8
title Security for wireless ad hoc networks
title_auth Security for wireless ad hoc networks
title_exact_search Security for wireless ad hoc networks
title_full Security for wireless ad hoc networks Farooq Anjum and Petros Mouchtaris
title_fullStr Security for wireless ad hoc networks Farooq Anjum and Petros Mouchtaris
title_full_unstemmed Security for wireless ad hoc networks Farooq Anjum and Petros Mouchtaris
title_short Security for wireless ad hoc networks
title_sort security for wireless ad hoc networks
topic COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Wireless LANs / Security measures fast
Wireless LANs Security measures
Computersicherheit (DE-588)4274324-2 gnd
Drahtloses lokales Netz (DE-588)4633975-9 gnd
Ad-hoc-Netz (DE-588)4674811-8 gnd
topic_facet COMPUTERS / Internet / Security
COMPUTERS / Networking / Security
COMPUTERS / Security / General
Wireless LANs / Security measures
Wireless LANs Security measures
Computersicherheit
Drahtloses lokales Netz
Ad-hoc-Netz
url http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=186646
work_keys_str_mv AT anjumfarooq securityforwirelessadhocnetworks
AT mouchtarispetros securityforwirelessadhocnetworks