- STAFF PICKS
- GIFTS + GIFT CARDS
- SELL BOOKS
- FIND A STORE
Currently out of stock.
available for shipping or prepaid pickup only
Other titles in the Artech House Computer Security Series series:
Bluetooth Security (Artech House Computer Security Series)by Christian Gehrmann
Synopses & Reviews
Bluetooth technology is becoming a popular way to furnish short-range wireless interconnectivity as an alternative to existing wire applications or as an enabling technology for new ones. With the number of Bluetooth-equipped consumer and industry devices rapidly increasing, it stands on the threshold of global deployment. This first-of-its-kind book, from expert authors actively contributing to the evolution of Bluetooth, provides an overview and detailed description of all the security functions and features of this technology's latest core release. The book shows networking professionals how to design a highly secure Bluetooth system and implement security enhancements. It also helps practitioners fully understand the main security risks involved with introducing Bluetooth-based communications in their organizations.
Book News Annotation:
The authors (all affiliated with Ericsson Mobile Platforms) offer a treatise on the security-related aspects of Bluetooth, the wireless communications technology. After an overview of the whole Bluetooth security architecture, they present chapters discussing key management, security algorithms and their design principles, the broadcast encryption function, access control mechanisms, and attacks on Bluetooth security. All of these chapters are based on the Bluetooth version 1.2 specification. The authors also provide discussion of possible enhancements to the specification including key management improvements and location tracking prevention measures.
Annotation ©2004 Book News, Inc., Portland, OR (booknews.com)
Expert authors actively contributing to the evolution of Bluetooth technology--a popular way to furnish short-range wireless interconnectivity--provide an overview and detailed description of the security functions and features of this technology's latest core release.
What Our Readers Are Saying
Business » General