30-06-2012, 11:45 AM
|
#26
|
Newbie
Gia nhập: Jun 2012
Trả Lời: 6
|
Nguyên văn bởi hoctinhoc
|
Tong hop cac sach ve Wireless
Gioi thieu voi cac ban cac sach tham khao ve Wireless Networking
1. Advanced Wired And Wireless Networking
Quote:
http://www.mediafire.com/?sharekey=a...018c8114394287
2. 802.11 WLANs and IP Networking Security QoS and Mobility
Quote:
http://www.mediafire.com/?sharekey=a...018c8114394287
3. Ad Hoc Networks Technologies And Protocols
Quote:
http://www.mediafire.com/?sharekey=a...eada0a1ae8665a
4. Building Secure Wireless Networks with 802.11
Quote:
http://www.mediafire.com/?sharekey=a...21d66e282a0ee8
5. Fundamentals of Wireless Communication
Quote:
http://www.mediafire.com/?sharekey=a...e6ba49b5870170
6. Secure Roaming in 802.11 Networks
Quote:
http://www.mediafire.com/?sharekey=a...5965eaa7bc68bc
WIRELESS MESH NETWORKING Architectures, Protocols and Standards
Edited by
Yan Zhang - Jijun Luo - Honglin Hu
CONTENTS
PART I: ARCHITECTURES
1 Wireless Mesh Networks: Issues and Solutions
2 Multiradio Multichannel Mesh Networks
3 IEEE 802.11-Based Wireless Mesh Networks
PART II: PROTOCOLS
4 Routing in Wireless Mesh Networks
5 Medium Access Control in Wireless Mesh Networks
6 Security in Wireless Mesh Networks
7 Scalability in Wireless Mesh Networks
8 Load Balancing in Wireless Mesh Networks
9 Cross-Layer Optimization for Scheduling in Wireless Mesh Networks
10 Multimedia Communications over Wireless Mesh Networks
11 Multiple Antenna Techniques for Wireless Mesh Networks
PART III: STANDARDIZATION AND ENABLING TECHNOLOGIES
12 Standardization of Wireless LAN Mesh Networks in IEEE 802.11s
13 IEEE 802.16 WiMAX Mesh Networking
14 Cognitive Radio and Dynamic Spectrum Management
15 Wireless Mesh Networks Case Study: Fire Emergency Management and Market Analysis
16 Wireless Mesh Networks for Public Safety and Disaster Recovery Applications
Download
Wireless Networks First-Step
Chapter 1. The Wireless World: An Introduction to Concepts
Chapter 2. Wireless System Architecture: How Wireless Works
Chapter 3. Radio Frequency and Light Signal Fundamentals: The Invisible Medium
Chapter 4. Wireless PANs: Networks for Small Places
Chapter 5. Wireless LANs: Networks for Buildings and Campuses
Chapter 6. Wireless MANs: Networks for Connecting Buildings and Remote Areas
Chapter 7. Wireless WANs: Networks for Worldwide Connections
Chapter 8. Wireless Network Security: Protecting Information Resources
Download
Handbook of Research on Wireless Security
Section I. Security Fundamentals
- Chapter I. Malicious Software in Mobile Devices
- Chapter II. Secure Service Discovery
- Chapter III. Security of Mobile Code
- Chapter IV. Identity Management
- Chapter V. Wireless Wardriving
- Chapter VI. Intrusion and Anomaly Detection in Wireless Networks
- Chapter VII. Peer-to-Peer (P2P) Network Security: Firewall Issues
- Chapter VIII. Identity Management for Wireless Service Access
- Chapter IX. Privacy Enhancing Techniques: A Survey and Classification
- Chapter X. Vulnerability Analysis and Defenses in Wireless Networks
- Chapter XI. Key Distribution and Management for Mobile Applications
- Chapter XII. Architecture and Protocols for Authentications, Authorization, and Accounting (AAA) in the Future Wireless Communications Networks
- Chapter XIII. Authentication, Authorisation, and Access Control in Mobile Systems
- Chapter XIV. Trustworthy Networks, Authentication, Privacy, and Security Models
- Chapter XV. The Provably Secure Formal Methods for Authentication and Key Agreement Protocols
- Chapter XVI. Multimedia Encryption and Watermarking in Wireless Environment
- Chapter XVII. System-on-Chip Design of the Whirlpool Hash Function
Section II.Security in 3G/B3G/4G
- Chapter XVIII. Security in 4G
- Chapter XIX. Security Architectures for B3G Mobile Networks
- Chapter XX. Security in UMTS 3G Mobile Networks
- Chapter XXI. Access Security in UMTS and IMS
- Chapter XXII. Security in 2.5G Mobile Systems
- Chapter XXIII. End-to-End Security Comparisons Between IEEE 802.16e and 3G Technologies
- Chapter XXIV. Generic Application Security in Current and Future Networks
- Chapter XXV. Authentication, Authorization, and Accounting (AAA) Framework in Network Mobility (NEMO) Environments
Section III.Security in Ad Hoc and Sensor Networks
- Chapter XXVI.Security in Mobile Ad Hoc Networks
- Chapter XXVII. Privacy and Anonymity in Mobile Ad Hoc Networks
- Chapter XXVIII. Secure Routing with Reputation in MANET
- Chapter XXIX. Trust Management and Context-Driven Access Control
- Chapter XXX. A Survey of Key Management in Mobile Ad Hoc Networks
- Chapter XXXI. Security Measures for Mobile Ad-Hoc Networks (MANETs)
- Chapter XXXII. A Novel Secure Video Surveillance System Over Wireless Ad-Hoc Networks
- Chapter XXXIII. Cutting the Gordian Knot: Intrusion Detection Systems in Ad Hoc Networks
- Chapter XXXIV. Security in Wireless Sensor Networks
- Chapter XXXV. Security and Privacy in Wireless Sensor Networks: Challenges and Solutions
- Chapter XXXVI. Routing Security in Wireless Sensor Networks
- Chapter XXXVII. Localization Security in Wireless Sensor Networks
- Chapter XXXVIII. Resilience Against False Data Injection Attack in Wireless Sensor Networks
- Chapter XXXIX. Survivability of Sensors with Key and Trust Management
- Chapter XL. Fault Tolerant Topology Design for Ad Hoc and Sensor Networks
Section IV. Security in Wireless PAN/LAN/MAN Networks
- Chapter XLI. Evaluating Security Mechanisms in Different Protocol Layers for Bluetooth Connections
- Chapter XLII. Bluetooth Devices Effect on Radiated EMS of Vehicle Wiring
- Chapter XLIII. Security in WLAN
- Chapter XLIV. Access Control in Wireless Local Area Networks: Fast Authentication Schemes
- Chapter XLV. Security and Privacy in RFID Based Wireless Networks
- Chapter XLVI. Security and Privacy Approaches for Wireless Local and Metropolitan Area Networks (LANs & MANS)
- Chapter XLVII. End-to-End (E2E) Security Approach in WiMAX:A Security Technical Overview for Corporate Multimedia Applications
- Chapter XLVIII. Evaluation of Security Architectures for Mobile Broadband Access
- Chapter XLIX. Extensible Authentication (EAP) Protocol Integrations in the Next eneration Cellular Networks
Download

|
kem trị sẹo http://www.vatgia.com/raovat/2659/47...m-tri-seo.html
http://www.vatgia.com/raovat/2657/51...m-tri-seo.html
http://www.vatgia.com/raovat/6133/46...o-mederma.html
http://www.lamchame.com/forum/showth...A%B9o-l%C3%B5m
|
|
|