Bluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures (SpringerBriefs in Computer Science)
De (autor) Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanenen Limba Engleză Carte Paperback – 12 Nov 2013
The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices.
Din seria SpringerBriefs in Computer Science
-
20%
Preț: 162.58 lei
-
Preț: 310.83 lei
-
Preț: 237.30 lei
-
20%
Preț: 291.38 lei
-
20%
Preț: 285.22 lei
-
20%
Preț: 282.75 lei
-
20%
Preț: 282.75 lei
-
20%
Preț: 290.16 lei
-
Preț: 327.18 lei
-
Preț: 348.69 lei
-
20%
Preț: 280.32 lei
-
20%
Preț: 279.07 lei
-
20%
Preț: 290.16 lei
-
20%
Preț: 282.75 lei
-
20%
Preț: 293.06 lei
-
20%
Preț: 285.22 lei
-
20%
Preț: 292.61 lei
-
20%
Preț: 279.07 lei
-
20%
Preț: 279.07 lei
-
20%
Preț: 292.61 lei
-
Preț: 134.59 lei
-
20%
Preț: 280.32 lei
-
20%
Preț: 376.35 lei
-
nou
Preț: 220.06 lei
-
20%
Preț: 287.69 lei
-
Preț: 321.51 lei
-
nou
Preț: 220.42 lei
-
nou
Preț: 220.42 lei
-
nou
Preț: 220.42 lei
-
20%
Preț: 208.70 lei
-
nou
Preț: 90.94 lei
-
nou
Preț: 212.00 lei
-
Preț: 258.62 lei
-
nou
Preț: 213.06 lei
-
nou
Preț: 213.89 lei
-
nou
Preț: 220.42 lei
-
20%
Preț: 232.67 lei
-
20%
Preț: 163.33 lei
-
20%
Preț: 227.61 lei
-
20%
Preț: 228.54 lei
-
20%
Preț: 233.51 lei
-
20%
Preț: 229.46 lei
-
Preț: 272.63 lei
-
20%
Preț: 165.39 lei
-
Preț: 273.82 lei
-
20%
Preț: 232.45 lei
-
20%
Preț: 234.65 lei
-
20%
Preț: 231.54 lei
-
20%
Preț: 233.51 lei
-
20%
Preț: 234.17 lei
Preț: 324.46 lei
Preț vechi: 405.57 lei
-20%
Puncte Express: 487
Preț estimativ în valută:
64.67€ • 71.75$ • 54.64£
64.67€ • 71.75$ • 54.64£
Carte tipărită la comandă
Livrare economică 13-27 ianuarie 20
Livrare express 19-27 decembrie pentru 75.37 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642406454
ISBN-10: 3642406459
Pagini: 105
Dimensiuni: 155 x 235 x 12 mm
Greutate: 1.71 kg
Ediția: 2013
Editura: Springer
Colecția Springer
Seria SpringerBriefs in Computer Science
Locul publicării: Berlin, Heidelberg, Germany
ISBN-10: 3642406459
Pagini: 105
Dimensiuni: 155 x 235 x 12 mm
Greutate: 1.71 kg
Ediția: 2013
Editura: Springer
Colecția Springer
Seria SpringerBriefs in Computer Science
Locul publicării: Berlin, Heidelberg, Germany
Public țintă
Professional/practitionerCuprins
Chap.
1
-
Introduction.-
Chap.
2
-
Overview
of
Bluetooth
Security.-
Chap.
3
-
Bluetooth
Network
Vulnerabilities.-
Chap.
4
-
Comparative
Analysis
of
Bluetooth
Security
Attacks.-
Chap.
5
-
Meet-in-the-Middle
(MITM)
Attacks
on
Bluetooth.-
Chap.
6
-
Countermeasures.-
Chap.
7
-
New
Practical
Attack.-
Chap.
8
-
Conclusion
and
Future
Work
References.
Notă biografică
Dr.
Keijo
Haataja
received
his
Ph.Lic.
in
2007
and
his
Ph.D.
in
2009
in
Computer
Science
from
the
University
of
Eastern
Finland
(UEF),
where
he
has
been
a
senior
assistant
professor
of
wireless
communications
and
data
security
since
2002.
He
is
a
member
of
the
Bluetooth
Security
Expert
Group
(SEG),
which
works
to
identify
threats
to
Bluetooth
wireless
security
and
to
develop
related
specification
enhancements,
white
papers,
test
cases,
and
test
tools.
He
has
also
been
a
technical
consultant
to
Unicta
Oy
since
2008.
His
main
research
interests
include
wireless
communications,
wireless
security,
mobile
systems,
sensor
networks,
data
communications,
computational
intelligence,
and
intelligent
autonomous
robots.
Dr. Konstantin Hyppönen received his Ph.D. in Computer Science in 2009 from the University of Kuopio. He has lectured on data security and software engineering. He works in the Finnish Social Insurance Institution (Kela), and participates in a number of national and European projects focusing on semantic operability and the security of eHealth services.
Ms. Sanna Pasanen received her M.Sc. in 2009 in Computer Science from UEF and her B.Eng. in 2013 in ICT/Telecommunications from the Helsinki Metropolia University of Applied Sciences. She works in the telecommunications and data networks team in IBM. Her main research interests include cloud services, unified communications, VoIP, and wireless networks.
Prof. Pekka Toivanen received his M.Sc. (Tech.) degree at Helsinki University of Technology in 1989 and D.Sc. (Tech.) degree in 1996 at Lappeenranta University of Technology. He has been a full professor in computational intelligence at UEF since 2007. He has published more than 100 reviewed research articles in international conferences and journals, and has served on many conference committees and editorial boards. His areas of interest are computational intelligence, image processing, machine vision, and the compression of spectral images.
Dr. Konstantin Hyppönen received his Ph.D. in Computer Science in 2009 from the University of Kuopio. He has lectured on data security and software engineering. He works in the Finnish Social Insurance Institution (Kela), and participates in a number of national and European projects focusing on semantic operability and the security of eHealth services.
Ms. Sanna Pasanen received her M.Sc. in 2009 in Computer Science from UEF and her B.Eng. in 2013 in ICT/Telecommunications from the Helsinki Metropolia University of Applied Sciences. She works in the telecommunications and data networks team in IBM. Her main research interests include cloud services, unified communications, VoIP, and wireless networks.
Prof. Pekka Toivanen received his M.Sc. (Tech.) degree at Helsinki University of Technology in 1989 and D.Sc. (Tech.) degree in 1996 at Lappeenranta University of Technology. He has been a full professor in computational intelligence at UEF since 2007. He has published more than 100 reviewed research articles in international conferences and journals, and has served on many conference committees and editorial boards. His areas of interest are computational intelligence, image processing, machine vision, and the compression of spectral images.
Textul de pe ultima copertă
Bluetooth
technology
has
enjoyed
tremendous
success,
and
it's
now
employed
in
billions
of
devices
for
short-range
wireless
data
and
real-time
audio
or
video
transfer.
In
this
book
the
authors
provide
an
overview
of
Bluetooth
security.
They
examine
network
vulnerabilities
and
provide
a
literature-review
comparative
analysis
of
recent
security
attacks.
They
analyze
and
explain
related
countermeasures,
including
one
based
on
secure
simple
pairing,
and
they
also
propose
a
novel
attack
that
works
against
all
existing
Bluetooth
versions.
They
conclude
with
a
discussion
on
future
research
directions.
The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices.
The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices.
Caracteristici
Authors
among
the
first
to
research
Bluetooth
vulnerabilities
in
an
academic
setting
Clearly explains vulnerabilities and countermeasures
Suitable for practitioners and researchers engaged with the security of networked and mobile devices
Clearly explains vulnerabilities and countermeasures
Suitable for practitioners and researchers engaged with the security of networked and mobile devices