Jeżeli nie znalazłeś poszukiwanej książki, skontaktuj się z nami wypełniając formularz kontaktowy.

Ta strona używa plików cookies, by ułatwić korzystanie z serwisu. Mogą Państwo określić warunki przechowywania lub dostępu do plików cookies w swojej przeglądarce zgodnie z polityką prywatności.

Wydawcy

Literatura do programów

Informacje szczegółowe o książce

Security for Ubiquitous Computing - ISBN 9780470844939

Security for Ubiquitous Computing

ISBN 9780470844939

Autor: Frank Stajano

Wydawca: Wiley

Dostępność: 3-6 tygodni

Cena: 540,75 zł

Przed złożeniem zamówienia prosimy o kontakt mailowy celem potwierdzenia ceny.


ISBN13:      

9780470844939

ISBN10:      

0470844930

Autor:      

Frank Stajano

Oprawa:      

Hardback

Rok Wydania:      

2002-02-12

Ilość stron:      

268

Wymiary:      

250x178

Tematy:      

TJ

Ubiquitous computing (ubicomp) is about networked microprocessors embedded in everyday objects: not just cellphones and home appliances but also books, bookshelves, bus stops and bathtubs. This future is closer than you might imagine.
The insecurity of networked PCs is notorious. If we deployed ubicomp systems as vulnerable as PCs, the risks for society would be catastrophic. How can we do better, and what are the new problems? In a very accessible style, this book provides a coherent framework to make sense of the many issues at stake.
Features include:
∗ An introduction to the state of the art in ubicomp research.
∗ A readable primer on security and cryptology.
∗ An up–to–date technical treatment of ubicomp security, including a sceptical look at Bluetooth and 802.11.
∗ "Peer–to–peer" and ad–hoc networking.
∗ An in–depth discussion of specific, cutting–edge solutions.
∗ An extensively annotated bibliography.
Security for Ubiquitous Computing combines clarity, brevity and authority. It will appeal to developers and researchers in ubiquitous computing, wireless and ad–hoc networking, wearable computing and related areas. Because it is readable and self–contained, it will also prove valuable to managers, analysts, technology watchers and end users who want to understand the new opportunities and risks of ubicomp.

Spis treści:
About the Author.
Forward.
Preface.
Acknowledgements.
Contact Information.
1. Introduction.
Scenario.
Essential terminology.
Problems.
Notation.
2. Ubiquitous computing.
Xerox PARC.
Norman′s Invisible Computer.
MIT.
HP′s Cooltown.
ORL/AT&T Labs Cambridge.
Security issues.
3. Computer security.
Confidentiality.
Integrity.
Availability.
Authentication.
Security policies.
4. Authentication.
New preconditions.
The Resurrec ting Duckling security policy model.
The many ways of being a master.
5. Confidentiality.
Cryptographic primitives for peanut processors.
Personal privacy.
6. Integrity.
Message integrity.
Device integrity.
7. Availability.
Threats to the communications channel.
Threats to the battery energy.
Threats from mobile code.
8. Anonymity.
The Cocaine Auction Protocol.
The anonymity layer.
9. Conclusions.
Appendix A: A Short Primer on Functions.
Appendix B: Existing Network Security Solutions.
Annotated bibliography.
Index.

Okładka tylna:
Ubiquitous computing (ubicomp) is about networked microprocessors embedded in everyday objects: not just cellphones and home appliances but also books, bookshelves, bus stops and bathtubs. This future is closer than you might imagine.
The insecurity of networked PCs is notorious. If we deployed ubicomp systems as vulnerable as PCs, the risks for society would be catastrophic. How can we do better, and what are the new problems? In a very accessible style, this book provides a coherent framework to make sense of the many issues at stake.
Features include:
∗ An introduction to the state of the art in ubicomp research.
∗ A readable primer on security and cryptology.
∗ An up–to–date technical treatment of ubicomp security, including a sceptical look at Bluetooth and 802.11.
∗ "Peer–to–peer" and ad–hoc networking.
∗ An in–depth discussion of specific, cutting–edge solutions.
∗ An extensively annotated bibliography.
Security for Ubiquitous Computing combines clarity, brevity and authority. It will appeal to developers and researchers in ubiquitous computing, wireless and ad–hoc networking, wearable computing and related areas. Because it is readable and self–contained, it will also prove valuable to managers, analysts, technology watchers and end users who want to understand the new opportunities and risks of ubicomp.

Koszyk

Książek w koszyku: 0 szt.

Wartość zakupów: 0,00 zł

ebooks
covid

Kontakt

Gambit
Centrum Oprogramowania
i Szkoleń Sp. z o.o.

Al. Pokoju 29b/22-24

31-564 Kraków


Siedziba Księgarni

ul. Kordylewskiego 1

31-542 Kraków

+48 12 410 5991

+48 12 410 5987

+48 12 410 5989

Zobacz na mapie google

Wyślij e-mail

Subskrypcje

Administratorem danych osobowych jest firma Gambit COiS Sp. z o.o. Na podany adres będzie wysyłany wyłącznie biuletyn informacyjny.

Autoryzacja płatności

PayU

Informacje na temat autoryzacji płatności poprzez PayU.

PayU banki

© Copyright 2012: GAMBIT COiS Sp. z o.o. Wszelkie prawa zastrzeżone.

Projekt i wykonanie: Alchemia Studio Reklamy