This first-of-its-kind book, from expert authors actively contributing to the evolution of Bluetooth specifications, provides an overview and detailed descriptions of all the security functions and features of this standard? latest core release. After categorizing all the security issues involved in ad hoc networking, this hands-on volume shows you how to design a highly secure Bluetooth system and implement security enhancements. The book also helps you fully understand the main security risks involved with introducing Bluetooth-based communications in your organization.
This cutting-edge resource examines all known attacks on Bluetooth security mechanisms and their implementations, demonstrating how some of these known weaknesses can be avoided with appropriate defensive measures. The book presents concrete examples of how to design security solutions for some Bluetooth applications and products built on these applications. You find real-world case studies including technical algorithms, mechanisms and protocols, and security architectures. These architectures offer valuable guidelines for use in building Bluetooth and non-Bluetooth-specific security mechanisms.
Reading a well-organized book that has structure, depth, and breadth is often the most efficient way to learn about a topic or reference a complex subject. One such publication Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security by Praphul Chandra is an excellent introduction to a complex subject. Targeting design engineers, this readable, 236-pages book (Newnes/Elsevier) ISBN 0-7506-7746-5) carefully explains the problems of security in various dimensions and begins to address what designers can or should do to enhance security.
Currently, there is neither a commonly-accepted definition of information systems (IS) quality nor a convergence of perspectives on quality approaches. The IS community has focused on the various contributions of people, delivery processes, development philosophies and methods. Measuring Information Systems Delivery Quality represents a spotlight on IS quality that exhibits the efforts of authors from
several countries across the globe.
The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker. This wide scope benefits anyone who has to administer, secure, hack, or conduct business on a wireless network.
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services.
AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its protocols Diameter and Radius. The authors give an overview of established and emerging standards for the provision of secure network access for mobile users while providing the basic design concepts and motivations.