Description |
1 online resource (xvi, 52 pages) : illustrations |
Summary |
The research in this book covers how to best balance security concerns with limited resources available on wireless devices as well as how to optimize security resources on higher-end non-mobile devices. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations. Security experts of today and tomorrow will learn a lot from this resource and it can be used for master level in computer science, information security, wireless network security and cryptography. -- Edited summary from book |
Bibliography |
Includes bibliographical references |
Notes |
Print version record |
Subject |
Computer security -- Software
|
|
COMPUTERS -- Networking -- Security.
|
|
Computer security
|
Genre/Form |
Software
|
Form |
Electronic book
|
Author |
Amiri, Iraj Sadegh, 1977- author.
|
|
Saberi, Iman, author
|
|
Yu, James, technical editor
|
ISBN |
9780128022238 |
|
012802223X |
|