Amazon cover image
Image from Amazon.com
Image from Google Jackets

Security of mobile communications / Noureddine Boudriga.

By: Material type: TextTextPublication details: Boca Raton : CRC Press, c2010.Description: xxxiii, 612 p. : ill. ; 25 cmISBN:
  • 9780849379413
Subject(s): DDC classification:
  • 005.8   22
Contents:
Section I: Basic Techniques for Mobile Communications and Security -- Threats, Hacking, and Viruses in Mobile Communications -- Access Control and Authentication in Mobile Communications -- Common Techniques for Mobile Communications Security -- Smart Card Security: The SIM/USIM Case -- Section II: Attack and Protection Techniques in Mobile Communication Networks -- Security of GSM Networks -- Security of 3G Networks -- Wireless Local Area Network Security -- Security of Ad Hoc Networks -- Section III: Security of Network-Based Services in Mobile Communications -- Inter-System Roaming and Internetworking Security -- Securing Mobile Services -- Security of Mobile Sensor Networks -- Security of Satellite Services -- Section IV: Protection Techniques for Mobile Applications Security of Mobile Payments-- Security of Mobile Voice Communications -- Security of Multimedia Communications.
Summary: The explosive demand for mobile communications is driving the development of wireless technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving rise to a myriad of security issues at all levels—from subscriber to network operator to service provider. Providing technicians and designers with a critical and comprehensive resource, Security of Mobile Communications brings together the policies, practices, and guidelines needed to identify and address the security issues related to today’s wireless sensor networks, satellite services, mobile e-services, and inter-system roaming and interconnecting systems. It details the major mobile standards for securing mobile communications and examines the architectures able to provide data confidentiality, authentication, integrity, and privacy in various wireless environments.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Books Books Main library General Stacks 005.8 / BO.S 2010 (Browse shelf(Opens below)) 1 Available 011761

Includes bibliographical references and index.

Section I: Basic Techniques for Mobile Communications and Security -- Threats, Hacking, and Viruses in Mobile Communications -- Access Control and Authentication in Mobile Communications -- Common Techniques for Mobile Communications Security -- Smart Card Security: The SIM/USIM Case -- Section II: Attack and Protection Techniques in Mobile Communication Networks -- Security of GSM Networks -- Security of 3G Networks -- Wireless Local Area Network Security -- Security of Ad Hoc Networks -- Section III: Security of Network-Based Services in Mobile Communications -- Inter-System Roaming and Internetworking Security -- Securing Mobile Services -- Security of Mobile Sensor Networks -- Security of Satellite Services -- Section IV: Protection Techniques for Mobile Applications Security of Mobile Payments-- Security of Mobile Voice Communications -- Security of Multimedia Communications.

The explosive demand for mobile communications is driving the development of wireless technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving rise to a myriad of security issues at all levels—from subscriber to network operator to service provider. Providing technicians and designers with a critical and comprehensive resource, Security of Mobile Communications brings together the policies, practices, and guidelines needed to identify and address the security issues related to today’s wireless sensor networks, satellite services, mobile e-services, and inter-system roaming and interconnecting systems. It details the major mobile standards for securing mobile communications and examines the architectures able to provide data confidentiality, authentication, integrity, and privacy in various wireless environments.

1

There are no comments on this title.

to post a comment.