第 1/1 張圖片
![Wireless Mobile Internet Security - 第 1/1 張圖片](https://i.ebayimg.com/images/g/7zYAAOSwlndZG9BR/s-l500.jpg)
Wireless Mobile Internet Security
狀況:
“2013. 497 pages. Hardcover book very good with light scuffing and edgewear. Spine square. Binding ”... 閱讀更多內容關於物品狀況
運費:
所在地:Salem, Oregon, 美國
送達日期:
估計於 6月26日, 三至 7月1日, 一之間送達 運送地點 43230
退貨:
保障:
請參閱物品說明或聯絡賣家以取得詳細資料。閱覽全部詳情查看保障詳情
(不符合「eBay 買家保障方案」資格)
物品細節
- 物品狀況
- 很好
- 賣家備註
- ISBN
- 9781118496534
- Subject Area
- Computers
- Publication Name
- Wireless Mobile Internet Security
- Publisher
- Wiley & Sons, Incorporated, John
- Item Length
- 9.9 in
- Subject
- Internet / General, Security / Online Safety & Privacy, Security / General
- Publication Year
- 2013
- Type
- Textbook
- Format
- Hardcover
- Language
- English
- Item Height
- 1.1 in
- Item Weight
- 32.6 Oz
- Item Width
- 6.9 in
- Number of Pages
- 522 Pages
關於產品
Product Information
The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies through multiple enhancements of both cellular mobile systems and Internet interoperability. Flawless integration between these two wired/wireless networks will enable subscribers to not only roam worldwide, but also to solve the ever increasing demand for data/Internet services. In order to keep up with this noteworthy growth in the demand for wireless broadband, new technologies and structural architectures are needed to greatly improve system performance and network scalability while significantly reducing the cost of equipment and deployment. Dr. Rhee covers the technological development of wired/wireless internet communications in compliance with each iterative generation up to 4G systems, with emphasis on wireless security aspects. By progressing in a systematic matter, presenting the theory and practice of wired/wireless mobile technologies along with various security problems, readers will gain an intimate sense of how mobile internet systems operate and how to address complex security issues. Features: Written by a top expert in information security Gives a clear understanding of wired/wireless mobile internet technologies Presents complete coverage of various cryptographic protocols and specifications needed for 3GPP: AES, KASUMI, Public-key and Elliptic curve cryptography Forecast new features and promising 4G packet-switched wireless internet technologies for voice and data communications Provides MIMO/OFDMA-based for 4G systems such as Long Term Evolution (LTE), Ultra Mobile Broadband (UMB), Mobile WiMax or Wireless Broadband (WiBro) Deals with Intrusion Detection System against worm/virus cyber attacks The book ideal for advanced undergraduate and postgraduate students enrolled in courses such as Wireless Access Networking, Mobile Internet Radio Communications. Practicing engineers in industry and research scientists can use the book as a reference to get reacquainted with mobile radio fundamentals or to gain deeper understanding of complex security issues.
Product Identifiers
Publisher
Wiley & Sons, Incorporated, John
ISBN-10
1118496531
ISBN-13
9781118496534
eBay Product ID (ePID)
150573377
Product Key Features
Number of Pages
522 Pages
Language
English
Publication Name
Wireless Mobile Internet Security
Publication Year
2013
Subject
Internet / General, Security / Online Safety & Privacy, Security / General
Type
Textbook
Subject Area
Computers
Format
Hardcover
Dimensions
Item Height
1.1 in
Item Weight
32.6 Oz
Item Length
9.9 in
Item Width
6.9 in
Additional Product Features
Edition Number
2
Intended Audience
Scholarly & Professional
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8
Lc Classification Number
Tk5105.875.I57
Table of Content
Preface xiii About the Author xxi Acknowledgments xxiii 1 Internetworking and Layered Models 1 1.1 Networking Technology 2 1.2 Connecting Devices 5 1.3 The OSI Model 8 1.4 TCP/IP Model 12 2 TCP/IP Suite and Internet Stack Protocols 15 2.1 Network Layer Protocols 15 2.2 Transport Layer Protocols 41 2.3 World Wide Web 47 2.4 File Transfer 49 2.5 E-Mail 50 2.6 Network Management Service 52 2.7 Converting IP Addresses 53 2.8 Routing Protocols 54 2.9 Remote System Programs 55 2.10 Social Networking Services 56 2.11 Smart IT Devices 57 2.12 Network Security Threats 58 2.13 Internet Security Threats 58 2.14 Computer Security Threats 59 3 Global Trend of Mobile Wireless Technology 63 3.1 1G Cellular Technology 63 3.2 2G Mobile Radio Technology 64 3.3 2.5G Mobile Radio Technology 67 3.4 3G Mobile Radio Technology (Situation and Status of 3G) 70 3.5 3G UMTS Security-Related Encryption Algorithm 75 4 Symmetric Block Ciphers 81 4.1 Data Encryption Standard (DES) 81 4.2 International Data Encryption Algorithm (IDEA) 99 4.3 RC5 Algorithm 108 4.4 RC6 Algorithm 123 4.5 AES (Rijndael) Algorithm 135 5 Hash Function, Message Digest, and Message Authentication Code 161 5.1 DMDC Algorithm 161 5.2 Advanced DMDC Algorithm 171 5.3 MD5 Message-Digest Algorithm 176 5.4 Secure Hash Algorithm (SHA-1) 188 5.5 Hashed Message Authentication Codes (HMAC) 195 6 Asymmetric Public-Key Cryptosystems 203 6.1 Diffie-Hellman Exponential Key Exchange 203 6.2 RSA Public-Key Cryptosystem 207 6.3 ElGamal's Public-Key Cryptosystem 215 6.4 Schnorr's Public-Key Cryptosystem 222 6.5 Digital Signature Algorithm 227 6.6 The Elliptic Curve Cryptosystem (ECC) 230 7 Public-Key Infrastructure 249 7.1 Internet Publications for Standards 250 7.2 Digital Signing Techniques 251 7.3 Functional Roles of PKI Entities 258 7.4 Key Elements for PKI Operations 263 7.5 X.509 Certificate Formats 271 7.6 Certificate Revocation List 282 7.7 Certification Path Validation 287 8 Network Layer Security 291 8.1 IPsec Protocol 291 8.2 IP Authentication Header 299 8.3 IP ESP 301 8.4 Key Management Protocol for IPsec 308 9 Transport Layer Security: SSLv3 and TLSv1 325 9.1 SSL Protocol 325 9.2 Cryptographic Computations 338 9.3 TLS Protocol 339 10 Electronic Mail Security: PGP, S/MIME 353 10.1 PGP 353 10.2 S/MIME 372 11 Internet Firewalls for Trusted Systems 387 11.1 Role of Firewalls 387 11.2 Firewall-Related Terminology 388 11.3 Types of Firewalls 392 11.4 Firewall Designs 398 11.5 IDS Against Cyber Attacks 401 11.6 Intrusion Detections Systems 404 12 SET for E-Commerce Transactions 415 12.1 Business Requirements for SET 415 12.2 SET System Participants 417 12.3 Cryptographic Operation Principles 418 12.4 Dual Signature and Signature Verification 420 12.5 Authentication and Message Integrity 424 12.6 Payment Processing 427 13 4G Wireless Internet Communication Technology 439 13.1 Mobile WiMAX 440 13.2 WiBro (Wireless Broadband) 448 13.3 UMB (Ultra Mobile Broadband) 452 13.4 LTE (Long Term Evolution) 457 Acronyms 467 Bibliography 473 Index 481
Copyright Date
2013
賣家提供的物品說明
運費與處理費
物品所在地:
Salem, Oregon, 美國
運送地點
不丹, 中國, 中國台灣, 中國澳門, 中國香港, 中非共和國, 丹麥, 乍德, 也門, 亞塞拜疆共和國, 亞美尼亞, 以色列, 伯利茲, 佛得角群島, 保加利亞, 克羅地亞共和國, 冰島, 列支敦士登, 利比利亞, 剛果共和國, 剛果民主共和國, 加拿大, 加納, 加蓬共和國, 匈牙利, 南非, 南韓, 博茨瓦納, 卡塔爾, 印尼, 印度, 危地馬拉, 厄瓜多爾, 厄立特里亞, 吉布提, 吉爾吉斯, 哈薩克, 哥倫比亞, 哥斯達黎加, 喀麥隆, 土庫斯安德凱科斯群島, 土庫曼, 土耳其, 圭亞那, 坦桑尼亞, 埃及, 埃塞俄比亞, 基里巴斯, 塔吉克, 塞內加爾, 塞拉利昂, 塞浦路斯, 塞爾維亞, 塞舌爾, 墨西哥, 多哥, 多明尼加共和國, 奧地利, 孟加拉, 安哥拉, 安圭拉島, 安提瓜和巴布達, 安道爾, 寮國, 尼加拉瓜, 尼日利亞, 尼日爾, 尼泊爾, 巴哈馬, 巴基斯坦, 巴布亞新畿內亞, 巴拉圭, 巴拿馬, 巴林, 巴西, 布基納法索, 布隆迪, 希臘, 幾內亞, 幾內亞比索, 德國, 意大利, 愛沙尼亞, 愛爾蘭, 所羅門群島, 拉脫維亞, 挪威, 捷克共和國, 摩洛哥, 摩爾多瓦, 摩納哥, 斐濟, 斯威士蘭, 斯洛伐克, 斯洛文尼亞, 斯里蘭卡, 新加坡, 日本, 智利, 柬埔寨, 格陵蘭, 格雷納達, 格魯吉亞, 梵蒂岡, 比利時, 毛里求斯, 汶萊, 沙特阿拉伯, 法國, 波斯尼亞和黑塞哥維那, 波蘭, 泰國, 津巴布韋, 洪都拉斯, 海地, 湯加, 澳洲, 烏干達, 烏拉圭, 烏茲別克, 牙買加, 特里尼達和多巴哥, 玻利維亞, 瑙魯, 瑞典, 瑞士, 瓦利斯和富圖納群島, 瓦努阿圖, 甘比亞, 百慕達群島, 盧旺達, 盧森堡, 直布羅陀, 科威特, 科特迪瓦(象牙海岸), 秘魯, 突尼斯, 立陶宛, 約旦, 納米比亞, 紐西蘭, 羅馬尼亞, 美國, 聖基茨-尼維斯, 聖文森和格瑞那丁, 聖盧西亞, 聖馬力諾, 肯亞, 芬蘭, 英國, 茅利塔尼亞, 荷蘭, 莫桑比克, 菲律賓, 萊索托, 葡萄牙, 蒙古, 蒙特色拉特島, 薩爾瓦多, 蘇里南, 西班牙, 西薩摩亞, 貝寧, 贊比亞, 赤道幾內亞, 越南, 開曼群島, 阿富汗, 阿拉伯聯合酋長國, 阿曼, 阿根廷, 阿爾及利亞, 阿爾巴尼亞, 阿魯巴, 馬來西亞, 馬其頓, 馬拉維, 馬爾代夫, 馬耳他, 馬達加斯加, 馬里, 黎巴嫩, 黑山
排除:
俄羅斯聯邦, 利比亞, 委內瑞拉, 巴貝多, 新喀里多尼亞, 法屬圭亞那, 法屬玻里尼西亞, 烏克蘭, 瓜德羅普島, 留尼汪島, 馬提尼克島
運費與處理費 | 運送地點 | 運送方式 | 運送*查看送達備註 |
---|---|---|---|
免運費 | 美國 | 經濟運送方式 (USPS Media MailTM) | 估計於 6月26日, 三至 7月1日, 一之間送達 運送地點 43230 |
US $14.95(大約 HK$ 116.71) | 美國 | 特快運送方式 (USPS Priority Mail®) | 估計於 6月24日, 一至 6月28日, 五之間送達 運送地點 43230 |
處理時間 |
---|
通常會在收到所有款項後的 2 個工作日內發貨。 |
稅項 |
---|
結賬時相關稅項可能適用。 進一步了解進一步了解為 eBay 購物繳稅。 |
物品編號 174504519621 的銷售稅
物品編號 174504519621 的銷售稅
賣家會對寄往以下各州的物品收取銷售稅:
州/省 | 銷售稅稅率 |
---|
退貨政策
收到物品後聯絡賣家的期限: | 退款方式 |
---|---|
30 日 | 退款 |
買家負責支付退貨運費。
賣家信用評價 (1,130)
o***1 (158)- 買家留下的信用評價。
過去 1 個月
購買已獲認證
Book looks brand new. Love the protective cover on the dust jacket. I've wanted this book for decades and finally found the right seller. Many thanks!!
0***o (956)- 買家留下的信用評價。
過去 6 個月
購買已獲認證
Item arrived quickly and as described. Definitely recommended.
t***k (706)- 買家留下的信用評價。
過去 6 個月
購買已獲認證
No problems. Well packaged.