WorldCat Linked Data Explorer

http://worldcat.org/entity/work/id/872764587

Security in Wireless Mesh Networks

Provides an introduction to security issues, advances, and future directions. This book examines the standards of security, addressing such topics as authentication, access control and authorization, attacks, privacy and trust, encryption, key management, identity management, DoS attacks, intrusion detection and protection, and secure routing.

Open All Close All

http://schema.org/description

  • "Provides an introduction to security issues, advances, and future directions. This book examines the standards of security, addressing such topics as authentication, access control and authorization, attacks, privacy and trust, encryption, key management, identity management, DoS attacks, intrusion detection and protection, and secure routing."@en
  • "Wireless Mesh Networks is a new topic believed to be a promising technology that will play an increasingly important role in the next generation of wireless mobile networks. "Security in Wireless Mesh Networks" provides an introduction to security issues, recent advancements, and future directions. This book examines the emerging standards of security, addressing such topics as authentication, access control and authorization, attacks, privacy and trust, encryption, key management, identity management, DoS attacks, intrusion detection and protection, secure routing, security standards, security policy, and more. This text also presents numerous case studies as well as various applications."@en
  • "Wireless Mesh Networks is a new topic believed to be a promising technology that will play an increasingly important role in the next generation of wireless mobile networks. "Security in Wireless Mesh Networks" provides an introduction to security issues, recent advancements, and future directions. This book examines the emerging standards of security, addressing such topics as authentication, access control and authorization, attacks, privacy and trust, encryption, key management, identity management, DoS attacks, intrusion detection and protection, secure routing, security standards, security policy, and more. This text also presents numerous case studies as well as various applications."

http://schema.org/genre

  • "Electronic resource"
  • "Ressources Internet"
  • "Electronic books"@en

http://schema.org/name

  • "Security in Wireless Mesh Networks"@en
  • "Security in Wireless Mesh Networks"
  • "Security in wireless mesh networks"@en
  • "Security in wireless mesh networks"