|
|
|
|
LEADER |
05394nam a2200481 a 4500 |
001 |
1947425 |
005 |
20171111235830.0 |
008 |
070322s2007 gr r 000 0 eng d |
020 |
|
|
|a 9780470118467
|q (electronic bk.)
|
020 |
|
|
|a 0470118466
|q (electronic bk.)
|
040 |
|
|
|a EAP
|b gre
|e AACR2
|
082 |
|
0 |
|2 21
|a 005.8
|
082 |
|
0 |
|2 22η εκδ.
|a 005.8
|
082 |
|
0 |
|2 22
|a 005.8
|
100 |
1 |
0 |
|a Anjum, Farooq
|
245 |
1 |
0 |
|a Security for wireless ad hoc networks
|c Farooq Anjum and Petros Mouchtaris
|
260 |
1 |
0 |
|a Hoboken, N.J.:
|b Wiley-Interscience,
|c c2007
|
300 |
1 |
0 |
|a xv, 247 σ. :
|b εικ.
|
500 |
0 |
0 |
|a Πρόκειται γιά ηλεκτρονικό βιβλίο (E-Book) το οποίο διατίθεται από το Διαδίκτυο σε ηλεκτρονική μορφή μέσω του εκδοτικού οίκου Wiley και είναι προσπελάσιμο από το Internet μόνο από την Ακαδημαϊκή κοινότητα του ΕΑΠ.
|
504 |
1 |
0 |
|a Βιβλιογραφία: σ. 234-244.
|
504 |
1 |
0 |
|a Ευρετήριο: σ. 245-247.
|
504 |
0 |
0 |
|a Includes bibliographical references (p. 234-244) and index
|
505 |
0 |
0 |
|a Cover -TOC36;Contents -Preface -Foreword -Acknowledgments
|
505 |
0 |
0 |
|a CH36;1 Introduction -146;1 Definition of Wireless Ad Hoc Networks -146;2 Applications of Wireless Ad Hoc Networks -146;3 Threats44; Attacks44; and Vulnerabilities -146;346;1 Threats -146;346;2 Vulnerabilities in Ad Hoc Networks -146;346;3 Attacks -146;4 Overview of the Book
|
505 |
0 |
0 |
|a CH36;2 Basic Security Concepts -246;1 Introduction -246;2 Basic Concepts -246;246;1 Attributes -246;246;2 Cryptographic Primitives -246;3 Modes of Operation -246;4 Miscellaneous Properties -246;446;1 One45;Way Property of Hash Chains -246;446;2 TESLA -246;5 Summary
|
505 |
0 |
0 |
|a CH36;3 Key Management -346;1 Introduction -346;2 Traditional Solution -346;3 Solutions for Ad Hoc Networks -346;346;1 Asymmetric Key45;Based Approach -346;346;2 Symmetric Key45;Based Approach -346;4 Summary
|
505 |
0 |
0 |
|a CH36;4 Secure Routing -446;1 Introduction -446;146;1 Distance45;Vector and Link45;State Routing -446;146;2 Proactive vs Reactive Routing -446;2 Ad Hoc On45;Demand Distance Vector -446;246;1 Secure AODV -446;246;2 Authenticated Routing for Ad Hoc Networks 40;ARAN41; -446;246;3 Security45;Aware Ad Hoc Routing -446;3 Dynamic Source Routing Protocol -446;346;1 Secure Routing Protocol -446;346;2 Ariadne -446;346;3 EndairA58; A Provably Secure Routing Protocol -446;4 Destination45;Sequenced Distance45;Vector Routing Protocol -446;446;1 Secure Efficient Distance Vector Routing 40;SEAD41; -446;446;2 SuperSEAD -446;446;3 S45;DSDV -446;5 Optimized Link45;State Routing Protocol - 446;546;1 Secure Extension to OLSR -446;546;2 Secure Link45;State Routing Protocol -446;6 Anonymous Routing Protocols -446;646;1 ANODR -446;646;2 MASK -446;7 Generic Attacks Against Routing -446;746;1 Wormhole Attacks -446;746;2 Rushing Attacks -446;746;3 Sybil Attacks -446;8 Summary
|
505 |
0 |
0 |
|a CH36;5 Intrusion Detection Systems -546;1 Introduction -546;146;1 Traditional IDS Systems -546;2 Unique IDS Challenges in MANET -546;3 Threat Model -546;4 Architecture for Intrusion Detection in MANET -546;446;1 Noncollaborative Intrusion Detection System -546;446;2 Cooperative Intrusion Detection -546;446;3 Key Novel Concepts for Cooperative Intrusion Detection in MANET -546;5 Evidence Collection -546;546;1 Local Evidence -546;546;2 Promiscuous Monitoring -546;546;3 Evidence made Available by Other Nodes -546;6 Detection of Specific Attacks -546;646;1 Detection of Packet Dropping Attacks -546;646;2 Detection of Attacks Against Routing Protocols -546;7 Summary
|
505 |
0 |
0 |
|a CH36;6 Policy Management -646;1 Introduction -646;2 Policy45;Based Network Management -646;246;1 Overview -646;246;2 Architecture -646;246;3 Policy Languages -- 646;246;4 Distributed Policy Management Architecture -646;246;5 IETF and DMTF Standardization Activities -646;3 Application of Policy Management to Security Management -646;346;1 Role45;Based Access Control 40;RBAC41; -646;346;2 Trust Management and the KeyNote System -646;346;3 Firewall Management -646;346;4.
|
650 |
1 |
0 |
|a Wireless LANs
|x Security measures
|
650 |
1 |
4 |
|a Electronic-Book
|x Wiley
|
650 |
1 |
7 |
|a Προστασία και ασφάλεια συστημάτων υπολογιστών
|x ΠΛΗ 35
|
650 |
1 |
7 |
|a Βασικές εξειδικεύσεις σε αρχιτεκτονική και δίκτυα των υπολογιστών
|x ΠΛΣ 51
|
650 |
1 |
7 |
|a Σχεδίαση και ανάπτυξη διάχυτων συστημάτων υπολογισμού
|x ΣΔΥ 50
|
650 |
1 |
7 |
|a Συστήματα κινητού υπολογισμού
|x ΣΔΥ 61
|
650 |
1 |
0 |
|a Ασύρματα τοπικά δίκτυα
|x Μέτρα ασφαλείας
|
650 |
1 |
0 |
|a Wireless LANs
|x Security measures
|
700 |
1 |
0 |
|a Μουχτάρης, Πέτρος
|
700 |
1 |
0 |
|a MOUCHTARIS, Petros
|
710 |
1 |
0 |
|a Wiley-Interscience
|
952 |
|
|
|a GR-KeIUL
|b 59cc254d6c5ad13446f946fe
|c 998a
|d 945l
|e 005.8 ANJ
|t 1
|x m
|z Books
|
952 |
|
|
|a GR-PaHOU
|b 59cc7f816c5ad13446fd58b6
|c 998a
|d 945l
|e 005.8 ANJ
|t 2
|x m
|z Books
|
952 |
|
|
|a GrAtEKP
|b 59cd1ff66c5ad13446104da7
|c 998a
|d 945l
|e 005.8 AnjF s 2007
|t 1
|x m
|z Books
|