Personnaliser

OK

Bluetooth Security Attacks - Keijo Haataja

Note : 0

0 avis
  • Soyez le premier à donner un avis

Vous en avez un à vendre ?

Vendez-le-vôtre

109,99 €

Occasion · Comme Neuf

  • Ou 27,50 € /mois

    • Livraison : 25,00 €
    • Livré entre le 23 et le 30 avril
    Voir les modes de livraison

    USAMedia

    PRO Vendeur favori

    4,6/5 sur + de 1 000 ventes

    Service client à l'écoute et une politique de retour sans tracas - Livraison des USA en 3 a 4 semaines (2 mois si circonstances exceptionnelles) - La plupart de nos titres sont en anglais, sauf indication contraire. N'hésitez pas à nous envoyer un e-... Voir plus
    Publicité
     
    Vous avez choisi le retrait chez le vendeur à
    • Payez directement sur Rakuten (CB, PayPal, 4xCB...)
    • Récupérez le produit directement chez le vendeur
    • Rakuten vous rembourse en cas de problème

    Gratuit et sans engagement

    Félicitations !

    Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !

    En savoir plus

    Retour

    Horaires

        Note :


        Avis sur Bluetooth Security Attacks de Keijo Haataja Format Broché  - Livre Technologie

        Note : 0 0 avis sur Bluetooth Security Attacks de Keijo Haataja Format Broché  - Livre Technologie

        Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.


        Présentation Bluetooth Security Attacks de Keijo Haataja Format Broché

         - Livre Technologie

        Livre Technologie - Keijo Haataja - 01/11/2013 - Broché - Langue : Anglais

        . .

      • Auteur(s) : Keijo Haataja - Konstantin Hyppönen - Pekka Toivanen - Sanna Pasanen
      • Editeur : Springer-Verlag Gmbh
      • Langue : Anglais
      • Parution : 01/11/2013
      • Format : Moyen, de 350g à 1kg
      • Nombre de pages : 104
      • Expédition : 172
      • Dimensions : 23.5 x 15.5 x 0.7
      • ISBN : 3642406459



      • Résumé :
        Dr. Keijo Haataja received his Ph.Lic. in 2007 and his Ph.D. in 2009 in Computer Science from the University of Eastern Finland (UEF), where he has been a senior assistant professor of wireless communications and data security since 2002. He is a member of the Bluetooth Security Expert Group (SEG), which works to identify threats to Bluetooth wireless security and to develop related specification enhancements, white papers, test cases, and test tools. He has also been a technical consultant to Unicta Oy since 2008. His main research interests include wireless communications, wireless security, mobile systems, sensor networks, data communications, computational intelligence, and intelligent autonomous robots. Dr. Konstantin Hypp?nen received his Ph.D. in Computer Science in 2009 from the University of Kuopio. He has lectured on data security and software engineering. He works in the Finnish Social Insurance Institution (Kela), and participates in a number of national and European projects focusing on semantic operability and the security of eHealth services. Ms. Sanna Pasanen received her M.Sc. in 2009 in Computer Science from UEF and her B.Eng. in 2013 in ICT/Telecommunications from the Helsinki Metropolia University of Applied Sciences. She works in the telecommunications and data networks team in IBM. Her main research interests include cloud services, unified communications, VoIP, and wireless networks. Prof. Pekka Toivanen received his M.Sc. (Tech.) degree at Helsinki University of Technology in 1989 and D.Sc. (Tech.) degree in 1996 at Lappeenranta University of Technology. He has been a full professor in computational intelligence at UEF since 2007. He has published more than 100 reviewed research articles in international conferences and journals, and has served on many conference committees and editorial boards. His areas of interest are computational intelligence, image processing, machine vision, and the compression ofspectral images....

        Biographie:

        Dr. Keijo Haataja received his Ph.Lic. in 2007 and his Ph.D. in 2009 in Computer Science from the University of Eastern Finland (UEF), where he has been a senior assistant professor of wireless communications and data security since 2002. He is a member of the Bluetooth Security Expert Group (SEG), which works to identify threats to Bluetooth wireless security and to develop related specification enhancements, white papers, test cases, and test tools. He has also been a technical consultant to Unicta Oy since 2008. His main research interests include wireless communications, wireless security, mobile systems, sensor networks, data communications, computational intelligence, and intelligent autonomous robots.

        Dr. Konstantin Hypp?nen received his Ph.D. in Computer Science in 2009 from the University of Kuopio. He has lectured on data security and software engineering. He works in the Finnish Social Insurance Institution (Kela), and participates in a number of national and European projects focusing on semantic operability and the security of eHealth services.

        Ms. Sanna Pasanen received her M.Sc. in 2009 in Computer Science from UEF and her B.Eng. in 2013 in ICT/Telecommunications from the Helsinki Metropolia University of Applied Sciences. She works in the telecommunications and data networks team in IBM. Her main research interests include cloud services, unified communications, VoIP, and wireless networks.

        Prof. Pekka Toivanen received his M.Sc. (Tech.) degree at Helsinki University of Technology in 1989 and D.Sc. (Tech.) degree in 1996 at Lappeenranta University of Technology. He has been a full professor in computational intelligence at UEF since 2007. He has published more than 100 reviewed research articles in international conferences and journals, and has served on many conference committees and editorial boards. His areas of interest are computational intelligence, image processing, machine vision, and the compression of spectral images.

        Sommaire:
        Chap. 1 - Introduction.- Chap. 2 - Overview of Bluetooth Security.- Chap. 3 - Bluetooth Network Vulnerabilities.- Chap. 4 - Comparative Analysis of Bluetooth Security Attacks.- Chap. 5 - Meet-in-the-Middle (MITM) Attacks on Bluetooth.- Chap. 6 - Countermeasures.- Chap. 7 - New Practical Attack.- Chap. 8 - Conclusion and Future Work References.

        Détails de conformité du produit

        Consulter les détails de conformité de ce produit (

        Personne responsable dans l'UE

        )
        Le choixNeuf et occasion
        Minimum5% remboursés
        La sécuritéSatisfait ou remboursé
        Le service clientsÀ votre écoute
        LinkedinFacebookTwitterInstagramYoutubePinterestTiktok
        visavisa
        mastercardmastercard
        klarnaklarna
        paypalpaypal
        floafloa
        americanexpressamericanexpress
        Rakuten Logo
        • Rakuten Kobo
        • Rakuten TV
        • Rakuten Viber
        • Rakuten Viki
        • Plus de services
        • À propos de Rakuten
        Rakuten.com