|刊登類別:
有類似物品要出售?

Wireless Mobile Internet Security by Man Young Rhee: New

狀況:
全新
價格:
US $131.33
大約HK$ 1,025.98
運費:
免費 Standard Shipping. 查看詳情— 運送
所在地:Sparks, Nevada, 美國
送達日期:
估計於 6月21日, 五6月26日, 三之間送達 運送地點 43230
估計送達日期 — 會在新視窗或分頁中開啟考慮到賣家的處理時間、寄出地郵遞區碼、目的地郵遞區碼、接收包裹時間,並取決於所選的運送方式以及收到全部款項全部款項 — 會在新視窗或分頁中開啟的時間。送達時間會因時而異,尤其是節日。
退貨:
30 日退貨. 由買家支付退貨運費. 查看詳情- 更多退貨相關資訊
保障:
請參閱物品說明或聯絡賣家以取得詳細資料。閱覽全部詳情查看保障詳情
(不符合「eBay 買家保障方案」資格)

賣家資料

註冊為商業賣家
賣家必須承擔此刊登物品的所有責任。
eBay 物品編號:283475648126
上次更新時間: 2024-05-08 19:57:30查看所有版本查看所有版本

物品細節

物品狀況
全新: 全新,未閱讀過和使用過的書籍,狀況完好,不存在缺頁或內頁受損。 查看所有物品狀況定義會在新視窗或分頁中開啟
Book Title
Wireless Mobile Internet Security
Publication Date
2013-04-19
Edition Number
2
ISBN
9781118496534
Subject Area
Computers
Publication Name
Wireless Mobile Internet Security
Item Length
9.9 in
Publisher
Wiley & Sons, Incorporated, John
Subject
Internet / General, Security / Online Safety & Privacy, Security / General
Publication Year
2013
Type
Textbook
Format
Hardcover
Language
English
Item Height
1.1 in
Author
Man Young Rhee
Item Width
6.9 in
Item Weight
32.6 Oz
Number of Pages
522 Pages

關於產品

Product Information

The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies through multiple enhancements of both cellular mobile systems and Internet interoperability. Flawless integration between these two wired/wireless networks will enable subscribers to not only roam worldwide, but also to solve the ever increasing demand for data/Internet services. In order to keep up with this noteworthy growth in the demand for wireless broadband, new technologies and structural architectures are needed to greatly improve system performance and network scalability while significantly reducing the cost of equipment and deployment. Dr. Rhee covers the technological development of wired/wireless internet communications in compliance with each iterative generation up to 4G systems, with emphasis on wireless security aspects. By progressing in a systematic matter, presenting the theory and practice of wired/wireless mobile technologies along with various security problems, readers will gain an intimate sense of how mobile internet systems operate and how to address complex security issues. Features: Written by a top expert in information security Gives a clear understanding of wired/wireless mobile internet technologies Presents complete coverage of various cryptographic protocols and specifications needed for 3GPP: AES, KASUMI, Public-key and Elliptic curve cryptography Forecast new features and promising 4G packet-switched wireless internet technologies for voice and data communications Provides MIMO/OFDMA-based for 4G systems such as Long Term Evolution (LTE), Ultra Mobile Broadband (UMB), Mobile WiMax or Wireless Broadband (WiBro) Deals with Intrusion Detection System against worm/virus cyber attacks The book ideal for advanced undergraduate and postgraduate students enrolled in courses such as Wireless Access Networking, Mobile Internet Radio Communications. Practicing engineers in industry and research scientists can use the book as a reference to get reacquainted with mobile radio fundamentals or to gain deeper understanding of complex security issues.

Product Identifiers

Publisher
Wiley & Sons, Incorporated, John
ISBN-10
1118496531
ISBN-13
9781118496534
eBay Product ID (ePID)
150573377

Product Key Features

Author
Man Young Rhee
Publication Name
Wireless Mobile Internet Security
Format
Hardcover
Language
English
Subject
Internet / General, Security / Online Safety & Privacy, Security / General
Publication Year
2013
Type
Textbook
Subject Area
Computers
Number of Pages
522 Pages

Dimensions

Item Length
9.9 in
Item Height
1.1 in
Item Width
6.9 in
Item Weight
32.6 Oz

Additional Product Features

Edition Number
2
Intended Audience
Scholarly & Professional
Lc Classification Number
Tk5105.875.I57
Table of Content
Preface xiii About the Author xxi Acknowledgments xxiii 1 Internetworking and Layered Models 1 1.1 Networking Technology 2 1.2 Connecting Devices 5 1.3 The OSI Model 8 1.4 TCP/IP Model 12 2 TCP/IP Suite and Internet Stack Protocols 15 2.1 Network Layer Protocols 15 2.2 Transport Layer Protocols 41 2.3 World Wide Web 47 2.4 File Transfer 49 2.5 E-Mail 50 2.6 Network Management Service 52 2.7 Converting IP Addresses 53 2.8 Routing Protocols 54 2.9 Remote System Programs 55 2.10 Social Networking Services 56 2.11 Smart IT Devices 57 2.12 Network Security Threats 58 2.13 Internet Security Threats 58 2.14 Computer Security Threats 59 3 Global Trend of Mobile Wireless Technology 63 3.1 1G Cellular Technology 63 3.2 2G Mobile Radio Technology 64 3.3 2.5G Mobile Radio Technology 67 3.4 3G Mobile Radio Technology (Situation and Status of 3G) 70 3.5 3G UMTS Security-Related Encryption Algorithm 75 4 Symmetric Block Ciphers 81 4.1 Data Encryption Standard (DES) 81 4.2 International Data Encryption Algorithm (IDEA) 99 4.3 RC5 Algorithm 108 4.4 RC6 Algorithm 123 4.5 AES (Rijndael) Algorithm 135 5 Hash Function, Message Digest, and Message Authentication Code 161 5.1 DMDC Algorithm 161 5.2 Advanced DMDC Algorithm 171 5.3 MD5 Message-Digest Algorithm 176 5.4 Secure Hash Algorithm (SHA-1) 188 5.5 Hashed Message Authentication Codes (HMAC) 195 6 Asymmetric Public-Key Cryptosystems 203 6.1 Diffie-Hellman Exponential Key Exchange 203 6.2 RSA Public-Key Cryptosystem 207 6.3 ElGamal's Public-Key Cryptosystem 215 6.4 Schnorr's Public-Key Cryptosystem 222 6.5 Digital Signature Algorithm 227 6.6 The Elliptic Curve Cryptosystem (ECC) 230 7 Public-Key Infrastructure 249 7.1 Internet Publications for Standards 250 7.2 Digital Signing Techniques 251 7.3 Functional Roles of PKI Entities 258 7.4 Key Elements for PKI Operations 263 7.5 X.509 Certificate Formats 271 7.6 Certificate Revocation List 282 7.7 Certification Path Validation 287 8 Network Layer Security 291 8.1 IPsec Protocol 291 8.2 IP Authentication Header 299 8.3 IP ESP 301 8.4 Key Management Protocol for IPsec 308 9 Transport Layer Security: SSLv3 and TLSv1 325 9.1 SSL Protocol 325 9.2 Cryptographic Computations 338 9.3 TLS Protocol 339 10 Electronic Mail Security: PGP, S/MIME 353 10.1 PGP 353 10.2 S/MIME 372 11 Internet Firewalls for Trusted Systems 387 11.1 Role of Firewalls 387 11.2 Firewall-Related Terminology 388 11.3 Types of Firewalls 392 11.4 Firewall Designs 398 11.5 IDS Against Cyber Attacks 401 11.6 Intrusion Detections Systems 404 12 SET for E-Commerce Transactions 415 12.1 Business Requirements for SET 415 12.2 SET System Participants 417 12.3 Cryptographic Operation Principles 418 12.4 Dual Signature and Signature Verification 420 12.5 Authentication and Message Integrity 424 12.6 Payment Processing 427 13 4G Wireless Internet Communication Technology 439 13.1 Mobile WiMAX 440 13.2 WiBro (Wireless Broadband) 448 13.3 UMB (Ultra Mobile Broadband) 452 13.4 LTE (Long Term Evolution) 457 Acronyms 467 Bibliography 473 Index 481
Copyright Date
2013
Dewey Decimal
005.8
Dewey Edition
23
Illustrated
Yes

賣家提供的物品說明

AlibrisBooks

AlibrisBooks

98.5% 正面信用評價
已賣出 176.16 萬 件物品
瀏覽商店聯絡

詳盡賣家評級

過去 12 個月的平均評級

說明準確
4.9
運費合理
4.9
運送速度
4.9
溝通
4.9

賣家信用評價 (462,493)

d***o (382)- 買家留下的信用評價。
過去 1 個月
購買已獲認證
Perfect. Thank you
h***y (119)- 買家留下的信用評價。
過去 1 個月
購買已獲認證
Beautiful book.
a***9 (409)- 買家留下的信用評價。
過去 1 個月
購買已獲認證
Thank you