by
Poisel, Richard.
Call Number
355.343 21
Publication Date
2002
Summary
Annotation This comprehensive engineering-level resource provides you with an excellent introduction to electronic warfare (EW) for communication systems. Extensively referenced with over 600 equations, it details the components, systems, and operations of electronic warfare systems dedicated to protecting and attacking military communications networks. You are provided with a complete understanding of how modern direction finders for communication signals work, along with their limitations.
Format:
Electronic Resources
Relevance:
67235.3984
by
Beyah, Raheem (Raheem A.), 1976-
Call Number
621.38 22
Publication Date
2010
Summary
Security issues in ad hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues addressed include (but are not limited to) attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, key management, location verification, security architectures and protocols, secrecy and integrity, network resilience and survivability, and trust models. This complete book provides an excellent reference for students, researchers, and industry practitioners related to these areas.
Format:
Electronic Resources
Relevance:
0.7993
View Other Search Results
by
NATO Advanced Research Workshop on Cyberwar-Netwar: Security in the Information Age (2003 : Lisbon, Portugal)
Call Number
355.343 22
Publication Date
2006
Summary
Internet is entering a stage which will have a stronger impact on the daily lives of all kinds of organizations.
Format:
Electronic Resources
Relevance:
0.0772
by
Hardjono, Thomas.
Call Number
005.8 22
Publication Date
2003
Summary
A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks, along with algorithms and protocols for multi-party secure communication.
Format:
Electronic Resources
Relevance:
0.0772
by
Furnell, Steven, 1970-
Call Number
005.8 22
Publication Date
2008
Summary
This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems.
Format:
Electronic Resources
Relevance:
0.0653
by
Porter, Thomas.
Call Number
005.8 22
Publication Date
2006
Summary
Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the Internet just like any server or workstation. This book will cover a wide variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) Telephony systems. The book will cover the attack methodologies that are used against the SIP and H.323 protocols as well as VoIP network infrastructure. Significant emphasis will be placed on both attack and defense techniques. This book is designed to be very hands on and scenario intensive More VoIP phone lines are being installed every day than traditional PBX phone lines VoIP is vulnerable to the same range of attacks of any network device VoIP phones can receive as many Spam voice mails as your e-mail can receive Spam e-mails, and as result must have the same types of anti-spam capabilities.
Format:
Electronic Resources
Relevance:
0.0566
Limit Search Results
Narrowed by: