Record ID | marc_columbia/Columbia-extract-20221130-010.mrc:307294435:2283 |
Source | marc_columbia |
Download Link | /show-records/marc_columbia/Columbia-extract-20221130-010.mrc:307294435:2283?format=raw |
LEADER: 02283cam a22003494a 4500
001 4791581
005 20221103035815.0
008 040420t20042004maua b 001 0 eng
010 $a 2004049721
020 $a1580535046 (alk. paper)
035 $a(OCoLC)ocm55095428
035 $a(NNC)4791581
035 $a4791581
040 $aDLC$cDLC$dYDX$dOrLoB-B
042 $apcc
050 00 $aTK5103.3$b.G44 2004
082 00 $a005.8$222
100 1 $aGehrmann, Christian.$0http://id.loc.gov/authorities/names/n2004008512
245 10 $aBluetooth security /$cChristian Gehrmann, Joakim Persson, Ben Smeets.
260 $aBoston :$bArtech House,$c[2004], ©2004.
300 $axii, 204 pages :$billustrations ;$c24 cm.
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
490 1 $aArtech House computer security series
504 $aIncludes bibliographical references and index.
505 00 $g1.$tIntroduction -- $g2.$tOverview of the Bluetooth security architecture -- $g3.$tBluetooth pairing and key management -- $g4.$tAlgorithms -- $g5.$tBroadcast encryption -- $g6.$tSecurity policies and access control -- $g7.$tAttacks, strengths, and weaknesses -- $g8.$tProviding anonymity -- $g9.$tKey management extensions -- $g10.$tSecurity for Bluetooth applications.
520 1 $a"This resource examine the most significant attacks on Bluetooth security mechanisms and their implementations, demonstrating how some of these known weaknesses can be avoided with appropriate defensive measures. The book presents concrete examples of how to design security solutions for some Bluetooth applications and products built on these applications. Professionals find real-world case studies including technical algorithms, mechanisms and protocols, and security architecture. These architectures offer valuable guidelines for use in building Bluetooth and non-Bluetooth-specific security mechanisms."--BOOK JACKET.
650 0 $aBluetooth technology$xSecurity measures.
700 1 $aPersson, Joakim.$0http://id.loc.gov/authorities/names/no2002008787
700 1 $aSmeets, Ben.$0http://id.loc.gov/authorities/names/n2004008513
830 0 $aArtech House computer security series.$0http://id.loc.gov/authorities/names/no00015115
852 00 $boff,eng$hTK5103.3$i.G44 2004