|
||||||||
|
||||||||
|
![]() |
|
Công Cụ | Xếp Bài | ![]() |
![]() |
#1 |
Guest
Trả Lời: n/a
![]() |
Tong hop cac sach ve Wireless!
Tong hop cac sach ve Wireless Gioi thieu voi cac ban cac sach tham khao ve Wireless Networking 1. Advanced Wired And Wireless Networking Quote: http://www.mediafire.com/?sharekey=a...018c8114394287 2. 802.11 WLANs and IP Networking Security QoS and Mobility Quote: http://www.mediafire.com/?sharekey=a...018c8114394287 3. Ad Hoc Networks Technologies And Protocols Quote: http://www.mediafire.com/?sharekey=a...eada0a1ae8665a 4. Building Secure Wireless Networks with 802.11 Quote: http://www.mediafire.com/?sharekey=a...21d66e282a0ee8 5. Fundamentals of Wireless Communication Quote: http://www.mediafire.com/?sharekey=a...e6ba49b5870170 6. Secure Roaming in 802.11 Networks Quote: http://www.mediafire.com/?sharekey=a...5965eaa7bc68bc WIRELESS MESH NETWORKING Architectures, Protocols and Standards Edited by Yan Zhang - Jijun Luo - Honglin Hu CONTENTS PART I: ARCHITECTURES 1 Wireless Mesh Networks: Issues and Solutions 2 Multiradio Multichannel Mesh Networks 3 IEEE 802.11-Based Wireless Mesh Networks PART II: PROTOCOLS 4 Routing in Wireless Mesh Networks 5 Medium Access Control in Wireless Mesh Networks 6 Security in Wireless Mesh Networks 7 Scalability in Wireless Mesh Networks 8 Load Balancing in Wireless Mesh Networks 9 Cross-Layer Optimization for Scheduling in Wireless Mesh Networks 10 Multimedia Communications over Wireless Mesh Networks 11 Multiple Antenna Techniques for Wireless Mesh Networks PART III: STANDARDIZATION AND ENABLING TECHNOLOGIES 12 Standardization of Wireless LAN Mesh Networks in IEEE 802.11s 13 IEEE 802.16 WiMAX Mesh Networking 14 Cognitive Radio and Dynamic Spectrum Management 15 Wireless Mesh Networks Case Study: Fire Emergency Management and Market Analysis 16 Wireless Mesh Networks for Public Safety and Disaster Recovery Applications Download Wireless Networks First-Step Chapter 1. The Wireless World: An Introduction to Concepts Chapter 2. Wireless System Architecture: How Wireless Works Chapter 3. Radio Frequency and Light Signal Fundamentals: The Invisible Medium Chapter 4. Wireless PANs: Networks for Small Places Chapter 5. Wireless LANs: Networks for Buildings and Campuses Chapter 6. Wireless MANs: Networks for Connecting Buildings and Remote Areas Chapter 7. Wireless WANs: Networks for Worldwide Connections Chapter 8. Wireless Network Security: Protecting Information Resources Download Handbook of Research on Wireless Security Section I. Security Fundamentals - Chapter I. Malicious Software in Mobile Devices - Chapter II. Secure Service Discovery - Chapter III. Security of Mobile Code - Chapter IV. Identity Management - Chapter V. Wireless Wardriving - Chapter VI. Intrusion and Anomaly Detection in Wireless Networks - Chapter VII. Peer-to-Peer (P2P) Network Security: Firewall Issues - Chapter VIII. Identity Management for Wireless Service Access - Chapter IX. Privacy Enhancing Techniques: A Survey and Classification - Chapter X. Vulnerability Analysis and Defenses in Wireless Networks - Chapter XI. Key Distribution and Management for Mobile Applications - Chapter XII. Architecture and Protocols for Authentications, Authorization, and Accounting (AAA) in the Future Wireless Communications Networks - Chapter XIII. Authentication, Authorisation, and Access Control in Mobile Systems - Chapter XIV. Trustworthy Networks, Authentication, Privacy, and Security Models - Chapter XV. The Provably Secure Formal Methods for Authentication and Key Agreement Protocols - Chapter XVI. Multimedia Encryption and Watermarking in Wireless Environment - Chapter XVII. System-on-Chip Design of the Whirlpool Hash Function Section II.Security in 3G/B3G/4G - Chapter XVIII. Security in 4G - Chapter XIX. Security Architectures for B3G Mobile Networks - Chapter XX. Security in UMTS 3G Mobile Networks - Chapter XXI. Access Security in UMTS and IMS - Chapter XXII. Security in 2.5G Mobile Systems - Chapter XXIII. End-to-End Security Comparisons Between IEEE 802.16e and 3G Technologies - Chapter XXIV. Generic Application Security in Current and Future Networks - Chapter XXV. Authentication, Authorization, and Accounting (AAA) Framework in Network Mobility (NEMO) Environments Section III.Security in Ad Hoc and Sensor Networks - Chapter XXVI.Security in Mobile Ad Hoc Networks - Chapter XXVII. Privacy and Anonymity in Mobile Ad Hoc Networks - Chapter XXVIII. Secure Routing with Reputation in MANET - Chapter XXIX. Trust Management and Context-Driven Access Control - Chapter XXX. A Survey of Key Management in Mobile Ad Hoc Networks - Chapter XXXI. Security Measures for Mobile Ad-Hoc Networks (MANETs) - Chapter XXXII. A Novel Secure Video Surveillance System Over Wireless Ad-Hoc Networks - Chapter XXXIII. Cutting the Gordian Knot: Intrusion Detection Systems in Ad Hoc Networks - Chapter XXXIV. Security in Wireless Sensor Networks - Chapter XXXV. Security and Privacy in Wireless Sensor Networks: Challenges and Solutions - Chapter XXXVI. Routing Security in Wireless Sensor Networks - Chapter XXXVII. Localization Security in Wireless Sensor Networks - Chapter XXXVIII. Resilience Against False Data Injection Attack in Wireless Sensor Networks - Chapter XXXIX. Survivability of Sensors with Key and Trust Management - Chapter XL. Fault Tolerant Topology Design for Ad Hoc and Sensor Networks Section IV. Security in Wireless PAN/LAN/MAN Networks - Chapter XLI. Evaluating Security Mechanisms in Different Protocol Layers for Bluetooth Connections - Chapter XLII. Bluetooth Devices Effect on Radiated EMS of Vehicle Wiring - Chapter XLIII. Security in WLAN - Chapter XLIV. Access Control in Wireless Local Area Networks: Fast Authentication Schemes - Chapter XLV. Security and Privacy in RFID Based Wireless Networks - Chapter XLVI. Security and Privacy Approaches for Wireless Local and Metropolitan Area Networks (LANs & MANS) - Chapter XLVII. End-to-End (E2E) Security Approach in WiMAX:A Security Technical Overview for Corporate Multimedia Applications - Chapter XLVIII. Evaluation of Security Architectures for Mobile Broadband Access - Chapter XLIX. Extensible Authentication (EAP) Protocol Integrations in the Next eneration Cellular Networks Download ![]() ![]() |
![]() |
|
|