CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - wireless security
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - wireless security - List
[
Other
]
Bulletproof Wireless Security - GSM, UMTS, 802.11, & Ad Hoc Security
DL : 0
Wireless Security is a vast topic and any attempt to address all issues in a single book is a daunting task. It is almost impossible to explain each and every security algorithm that is used in wireless security in detail in a single volume.
Update
: 2010-12-07
Size
: 2.48mb
Publisher
:
yeahelton@hotmail.com
[
matlab
]
802.11Security
DL : 0
Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you ll want this book beside you every step of the way.-Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in Theor y and practice of wireless security, dispelling some of the myths along the way. In do ing so, they provide you with the technical grounding r equired to think about how the rest of the book ap plies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--ba sed systems. you ll want this book beside you every step of the way.
Update
: 2025-02-17
Size
: 816kb
Publisher
:
秦
[
Other
]
wireless_4
DL : 0
802.11 security(安全).rar 无线应用安全 4-802.11 security (security). Rar Wireless Application Security 4
Update
: 2025-02-17
Size
: 723kb
Publisher
:
chen
[
Software Engineering
]
wireless
DL : 0
无线智能安防系统的方案,可以给大家做安防的人有一些设计经验的分享。-Wireless Intelligent Security Systems program, you can give us security people do have some design experience-sharing.
Update
: 2025-02-17
Size
: 241kb
Publisher
:
吕海安
[
3G develop
]
coco
DL : 0
无线传感器网络QoS保证技术 无线传感器网络数据融合技术 无线传感器网络安全机制-Wireless sensor network to guarantee QoS technology wireless sensor network data fusion technology wireless sensor network security mechanisms
Update
: 2025-02-17
Size
: 138kb
Publisher
:
coco
[
Communication
]
802.11i-2004
DL : 0
802.11i无线安全标准2004修正版-802.11i wireless security standard in 2004 amended version
Update
: 2025-02-17
Size
: 1.29mb
Publisher
:
BANQHU
[
Other
]
WirelessSecurityEssentials
DL : 0
无线安全系列的一本好书,国外经典教材,值得一看-Wireless security series of a good book, a classic foreign materials, worth a visit
Update
: 2025-02-17
Size
: 4.3mb
Publisher
:
cuiyanzhe
[
SCM
]
security
DL : 0
关于无线传感器网络安全性问题的研究进展和相关讨论的论文。-On wireless sensor network security research progress and related discussion papers.
Update
: 2025-02-17
Size
: 125kb
Publisher
:
苏可
[
Other
]
wireless-security-know-it-all.9781856175296.39185
DL : 0
wireless security book which can be fruitful for guys who is studying courses in security
Update
: 2025-02-17
Size
: 4.24mb
Publisher
:
zahid
[
Other
]
Wireless.Security.GSM.UMTS.802.dot.11
DL : 0
关于无线安全的一本好书,包括了二代、三代移动通信网络和无线局域网里面的安全协议和算法。-Wireless Security is a vast topic and any attempt to address all issues in a single book is a daunting task. It is almost impossible to explain each and every security algorithm that is used in wireless security in detail in a single volume. In writing this book, I have tried to strike a balance between architectural overviews and minute details. The aim of this book has been to answer questions like: How is wireless security different from security of wireline networks? How has wireless security evolved with changes in wireless networking? What is the architectural philosophy behind the design of wireless security protocols? What are the loopholes in these protocols and how can they be rectified in future designs?
Update
: 2025-02-17
Size
: 3.95mb
Publisher
:
秦中元
[
Other
]
Security.and.Quality.of.Service.in.Ad.Hoc.Wireles
DL : 0
it is Security and Quality of Service in Ad Hoc Wireless Networks Mar 2008
Update
: 2025-02-17
Size
: 2.39mb
Publisher
:
vamsikrishna
[
Internet-Network
]
802.11Security
DL : 0
O Reilly出版的有关802.11无线网络安全方面的权威著作,是研究无线网络安全技术人员重要的参考书籍-Reilly published on 802.11 wireless network security authority of the book is to study the wireless network security and technical personnel an important reference book
Update
: 2025-02-17
Size
: 816kb
Publisher
:
matt
[
Other
]
managing-cisco-network-security.9781931836562.240
DL : 0
Managing Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.
Update
: 2025-02-17
Size
: 5.16mb
Publisher
:
kinomira
[
Program doc
]
OReilly.802.11.Wireless.Networks.The.Definitive.G
DL : 0
As a network administrator, architect, or security professional, you need to understand the capabilities, limitations, and risks associated with integrating wireless LAN technology into your current infrastructure. This practical guide provides all the information necessary to analyze and deploy wireless networks with confidence. It?s the only source that offers a full spectrum view of 802.11, from the minute details of the specification, to deployment, monitoring, and troubleshooting.
Update
: 2025-02-17
Size
: 7.45mb
Publisher
:
MEONGHUN LEE
[
Other Embeded program
]
RFID-security-system
DL : 0
This project aimed to develop a wireless system to detect and allow only the authorized persons. The system was based on Radio Frequency Identification (RFID) technology and consists of a passive RFID tag. The passive micro transponder tag collects power from the 125 KHz magnetic field generated by the base station, gathers information about the Tag ID and sends this information to the base station. The base station receives, decodes and checks the information available in its Database and Manchester code was used to send those information. The system performed as desired with a 10cm diameter antenna attached to the transponder. The Base Station is built by using the Popular 8051 family Microcontroller. It gets the tag ID and if the tag ID is stored in its memory then the microcontroller will allow the person inside. RFID Reader Module, are also called as interrogators.
Update
: 2025-02-17
Size
: 109kb
Publisher
:
Binu
[
Other
]
OnBroadcastAuthenticationinWirelessSensorNetworks.
DL : 0
无线传感器网络中的广播认证 摘要:广播认证是无线传感器网络安全服务的关键(WSNs)。-Wireless sensor network broadcast authentication Abstract: broadcast authentication in wireless sensor network security services, key (WSNs).
Update
: 2025-02-17
Size
: 142kb
Publisher
:
zj
[
Software Engineering
]
MY-Project
DL : 0
Wireless Security based Vehicle authentication System
Update
: 2025-02-17
Size
: 2.51mb
Publisher
:
vijay
[
Software Engineering
]
Wireless-Security
DL : 0
Wireless Security and Cryptography Specifications and Implementations
Update
: 2025-02-17
Size
: 3.03mb
Publisher
:
pxpro
[
Program doc
]
Wireless-Security-Overview
DL : 0
无线网络安全方面综述性文献,PDF版,可以参考一下-Wireless Security Overview,for you reference.
Update
: 2025-02-17
Size
: 211kb
Publisher
:
[
Software Engineering
]
Wireless-Security-Online
DL : 0
Wireless Security Online Wireless Security Online
Update
: 2025-02-17
Size
: 44kb
Publisher
:
mohammed s
«
1
2
3
4
5
6
7
8
9
10
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.