Security for mobile networks and platforms.9781596930087
Security for mobile networks and platforms.
Aissi, Selim et al.
Artech House universal personal communication series
Written by a security architect at Intel and two security experts working in Europe, this book describes hardware and software security approaches employed on mobile platforms, wireless protocols, and network security aspects of wireless area networks. After introducing authorization and cryptographic techniques, the authors explain communication stacks, web services (1) Loosely, any online service delivered over the Web. Such usage appears in articles from non-technical sources, but not in IT-oriented publications, because definition #2 below describes the correct use of the term. , managed runtimes, certification schemes, the TLS (1) (Transport Layer Security) A security protocol from the IETF that is based on the Secure Sockets Layer (SSL) 3.0 protocol developed by Netscape. TLS uses digital certificates to authenticate the user as well as authenticate the network (in a wireless protocol, IPsec, Bluetooth, and the IEEE (Institute of Electrical and Electronics Engineers, New York, www.ieee.org) A membership organization that includes engineers, scientists and students in electronics and allied fields. 802.11 standard and countermeasures That form of military science that, by the employment of devices and/or techniques, has as its objective the impairment of the operational effectiveness of enemy activity. See also electronic warfare. .
([c]20062005 Book News, Inc., Portland, OR)