Bluetooth Security Attacks - Keijo Haataja
- Format: Broché Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtre109,99 €
Occasion · Comme Neuf
Ou 27,50 € /mois
- Livraison : 25,00 €
- Livré entre le 23 et le 30 avril
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Bluetooth Security Attacks de Keijo Haataja Format Broché - Livre Technologie
0 avis sur Bluetooth Security Attacks de Keijo Haataja Format Broché - Livre Technologie
Donnez votre avis et cumulez 5
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
-
Mesoscale Meteorology In Midlatitudes
Neuf dès 101,19 €
Occasion dès 91,98 €
-
Falkland Road
Neuf dès 83,87 €
-
Stranger Things: The Ultimate Pop-Up Book (Reinhart Pop-Up Studio)
Neuf dès 67,68 €
-
Monster Hunter Illustrations 2 (Hardcover)
Neuf dès 69,84 €
Occasion dès 69,00 €
-
Marvel Vs Capcom: Ultimate Complete Works
Neuf dès 59,24 €
-
Life - 100 Photographs That Changed The World
Occasion dès 76,99 €
-
Cosaan =: Les Origines (La Civilisation Sereer) (French Edition)
Occasion dès 89,00 €
-
In The American West 40th Anniversary Edition
Neuf dès 80,00 €
Occasion dès 194,68 €
-
Das Labyrinth Der Zärtlichen Kraft - 166 Liebesgeschichten - Mit Einer Dvd
Occasion dès 83,99 €
-
Meditations Marcus Aurelius
Occasion dès 149,00 €
-
Animal Crossing: New Horizons Official Complete Guide
3 avis
Neuf dès 84,94 €
-
Rehab Science: How To Overcome Pain And Heal From Injury
Neuf dès 58,00 €
-
Pierre Molinier
Occasion dès 75,00 €
-
Bill Brandt: Shadow & Light
Occasion dès 63,67 €
-
Introduction To Topology
Neuf dès 152,99 €
-
Animal Intelligence
Neuf dès 172,99 €
Occasion dès 90,99 €
-
The Collected Works Of Chögyam Trungpa, Volume 9
Neuf dès 57,65 €
-
Postmodern Analysis (Universitext)
Occasion dès 112,99 €
-
Partial Differential Equations Ii
Neuf dès 96,40 €
-
B2 First 4 Student's Book With Answers With Audio With Resource Bank
Occasion dès 101,28 €
Produits similaires
Présentation Bluetooth Security Attacks de Keijo Haataja Format Broché
- Livre Technologie
Résumé :
Dr. Keijo Haataja received his Ph.Lic. in 2007 and his Ph.D. in 2009 in Computer Science from the University of Eastern Finland (UEF), where he has been a senior assistant professor of wireless communications and data security since 2002. He is a member of the Bluetooth Security Expert Group (SEG), which works to identify threats to Bluetooth wireless security and to develop related specification enhancements, white papers, test cases, and test tools. He has also been a technical consultant to Unicta Oy since 2008. His main research interests include wireless communications, wireless security, mobile systems, sensor networks, data communications, computational intelligence, and intelligent autonomous robots. Dr. Konstantin Hypp?nen received his Ph.D. in Computer Science in 2009 from the University of Kuopio. He has lectured on data security and software engineering. He works in the Finnish Social Insurance Institution (Kela), and participates in a number of national and European projects focusing on semantic operability and the security of eHealth services. Ms. Sanna Pasanen received her M.Sc. in 2009 in Computer Science from UEF and her B.Eng. in 2013 in ICT/Telecommunications from the Helsinki Metropolia University of Applied Sciences. She works in the telecommunications and data networks team in IBM. Her main research interests include cloud services, unified communications, VoIP, and wireless networks. Prof. Pekka Toivanen received his M.Sc. (Tech.) degree at Helsinki University of Technology in 1989 and D.Sc. (Tech.) degree in 1996 at Lappeenranta University of Technology. He has been a full professor in computational intelligence at UEF since 2007. He has published more than 100 reviewed research articles in international conferences and journals, and has served on many conference committees and editorial boards. His areas of interest are computational intelligence, image processing, machine vision, and the compression ofspectral images....
Biographie: Dr. Keijo Haataja received his Ph.Lic. in 2007 and his Ph.D. in 2009 in Computer Science from the University of Eastern Finland (UEF), where he has been a senior assistant professor of wireless communications and data security since 2002. He is a member of the Bluetooth Security Expert Group (SEG), which works to identify threats to Bluetooth wireless security and to develop related specification enhancements, white papers, test cases, and test tools. He has also been a technical consultant to Unicta Oy since 2008. His main research interests include wireless communications, wireless security, mobile systems, sensor networks, data communications, computational intelligence, and intelligent autonomous robots. Dr. Konstantin Hypp?nen received his Ph.D. in Computer Science in 2009 from the University of Kuopio. He has lectured on data security and software engineering. He works in the Finnish Social Insurance Institution (Kela), and participates in a number of national and European projects focusing on semantic operability and the security of eHealth services. Ms. Sanna Pasanen received her M.Sc. in 2009 in Computer Science from UEF and her B.Eng. in 2013 in ICT/Telecommunications from the Helsinki Metropolia University of Applied Sciences. She works in the telecommunications and data networks team in IBM. Her main research interests include cloud services, unified communications, VoIP, and wireless networks. Prof. Pekka Toivanen received his M.Sc. (Tech.) degree at Helsinki University of Technology in 1989 and D.Sc. (Tech.) degree in 1996 at Lappeenranta University of Technology. He has been a full professor in computational intelligence at UEF since 2007. He has published more than 100 reviewed research articles in international conferences and journals, and has served on many conference committees and editorial boards. His areas of interest are computational intelligence, image processing, machine vision, and the compression of spectral images.
Sommaire:
Chap. 1 - Introduction.- Chap. 2 - Overview of Bluetooth Security.- Chap. 3 - Bluetooth Network Vulnerabilities.- Chap. 4 - Comparative Analysis of Bluetooth Security Attacks.- Chap. 5 - Meet-in-the-Middle (MITM) Attacks on Bluetooth.- Chap. 6 - Countermeasures.- Chap. 7 - New Practical Attack.- Chap. 8 - Conclusion and Future Work References.
Détails de conformité du produit
Personne responsable dans l'UE