Wireless mobile internet security / (Record no. 42743)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 07518nam a2200481 i 4500 |
001 - CONTROL NUMBER | |
control field | 8039681 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | IEEE |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20191218152129.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr |n||||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 171024s2008 maua ob 001 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
Canceled/invalid LC control number | 2012040165 (print) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781118512920 |
Qualifying information | electronic |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781118496534 |
Qualifying information | cloth |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1002/9781118512920 |
Source of number or code | doi |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (CaBNVSL)mat08039681 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (IDAMS)0b00006485f0d7df |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | CaBNVSL |
Language of cataloging | eng |
Description conventions | rda |
Transcribing agency | CaBNVSL |
Modifying agency | CaBNVSL |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5103.4885 |
Item number | .R49 2013eb |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 004.67/8 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Rhee, Man Young, |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | Wireless mobile internet security / |
Statement of responsibility, etc. | Man Young Rhee, Endowed Chair Professor, Kyung Hee University, Professor Emeritus, Hanyang University, Republic of Korea. |
250 ## - EDITION STATEMENT | |
Edition statement | Second edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Chichester, West Sussex, United Kingdom : |
Name of producer, publisher, distributor, manufacturer | Wiley, A John Wiley & Sons Ltd., Publication, |
Date of production, publication, distribution, manufacture, or copyright notice | 2013. |
264 #2 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | [Piscataqay, New Jersey] : |
Name of producer, publisher, distributor, manufacturer | IEEE Xplore, |
Date of production, publication, distribution, manufacture, or copyright notice | [2013] |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 PDF (xx, 497 pages) : |
Other physical details | illustrations. |
336 ## - CONTENT TYPE | |
Content type term | text |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | electronic |
Source | isbdmedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Source | rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references (pages 473-480) and index. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | -- Preface xiii -- About the Author xxi -- Acknowledgments xxiii -- 1 Internetworking and Layered Models 1 -- 1.1 Networking Technology 2 -- 1.2 Connecting Devices 5 -- 1.3 The OSI Model 8 -- 1.4 TCP/IP Model 12 -- 2 TCP/IP Suite and Internet Stack Protocols 15 -- 2.1 Network Layer Protocols 15 -- 2.2 Transport Layer Protocols 41 -- 2.3 World Wide Web 47 -- 2.4 File Transfer 49 -- 2.5 E-Mail 50 -- 2.6 Network Management Service 52 -- 2.7 Converting IP Addresses 53 -- 2.8 Routing Protocols 54 -- 2.9 Remote System Programs 55 -- 2.10 Social Networking Services 56 -- 2.11 Smart IT Devices 57 -- 2.12 Network Security Threats 58 -- 2.13 Internet Security Threats 58 -- 2.14 Computer Security Threats 59 -- 3 Global Trend of Mobile Wireless Technology 63 -- 3.1 1G Cellular Technology 63 -- 3.2 2G Mobile Radio Technology 64 -- 3.3 2.5G Mobile Radio Technology 67 -- 3.4 3G Mobile Radio Technology (Situation and Status of 3G) 70 -- 3.5 3G UMTS Security-Related Encryption Algorithm 75 -- 4 Symmetric Block Ciphers 81 -- 4.1 Data Encryption Standard (DES) 81 -- 4.2 International Data Encryption Algorithm (IDEA) 99 -- 4.3 RC5 Algorithm 108 -- 4.4 RC6 Algorithm 123 -- 4.5 AES (Rijndael) Algorithm 135 -- 5 Hash Function, Message Digest, and Message Authentication Code 161 -- 5.1 DMDC Algorithm 161 -- 5.2 Advanced DMDC Algorithm 171 -- 5.3 MD5 Message-Digest Algorithm 176 -- 5.4 Secure Hash Algorithm (SHA-1) 188 -- 5.5 Hashed Message Authentication Codes (HMAC) 195 -- 6 Asymmetric Public-Key Cryptosystems 203 -- 6.1 Diffie / Hellman Exponential Key Exchange 203 -- 6.2 RSA Public-Key Cryptosystem 207 -- 6.3 ElGamal's Public-Key Cryptosystem 215 -- 6.4 Schnorr's Public-Key Cryptosystem 222 -- 6.5 Digital Signature Algorithm 227 -- 6.6 The Elliptic Curve Cryptosystem (ECC) 230 -- 7 Public-Key Infrastructure 249 -- 7.1 Internet Publications for Standards 250 -- 7.2 Digital Signing Techniques 251 -- 7.3 Functional Roles of PKI Entities 258 -- 7.4 Key Elements for PKI Operations 263 -- 7.5 X.509 Certificate Formats 271. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 7.6 Certificate Revocation List 282 -- 7.7 Certification Path Validation 287 -- 8 Network Layer Security 291 -- 8.1 IPsec Protocol 291 -- 8.2 IP Authentication Header 299 -- 8.3 IP ESP 301 -- 8.4 Key Management Protocol for IPsec 308 -- 9 Transport Layer Security: SSLv3 and TLSv1 325 -- 9.1 SSL Protocol 325 -- 9.2 Cryptographic Computations 338 -- 9.3 TLS Protocol 339 -- 10 Electronic Mail Security: PGP, S/MIME 353 -- 10.1 PGP 353 -- 10.2 S/MIME 372 -- 11 Internet Firewalls for Trusted Systems 387 -- 11.1 Role of Firewalls 387 -- 11.2 Firewall-Related Terminology 388 -- 11.3 Types of Firewalls 392 -- 11.4 Firewall Designs 398 -- 11.5 IDS Against Cyber Attacks 401 -- 11.6 Intrusion Detections Systems 404 -- 12 SET for E-Commerce Transactions 415 -- 12.1 Business Requirements for SET 415 -- 12.2 SET System Participants 417 -- 12.3 Cryptographic Operation Principles 418 -- 12.4 Dual Signature and Signature Verification 420 -- 12.5 Authentication and Message Integrity 424 -- 12.6 Payment Processing 427 -- 13 4G Wireless Internet Communication Technology 439 -- 13.1 Mobile WiMAX 440 -- 13.2 WiBro (Wireless Broadband) 448 -- 13.3 UMB (Ultra Mobile Broadband) 452 -- 13.4 LTE (Long Term Evolution) 457 -- Acronyms 467 -- Bibliography 473 -- Index 481. |
506 ## - RESTRICTIONS ON ACCESS NOTE | |
Terms governing access | Restricted to subscribers or individual electronic text purchasers. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies through multiple enhancements of both cellular mobile systems and Internet interoperability. Flawless integration between these two wired/wireless networks will enable subscribers to not only roam worldwide, but also to solve the ever increasing demand for data/Internet services. In order to keep up with this noteworthy growth in the demand for wireless broadband, new technologies and structural architectures are needed to greatly improve system performance and network scalability while significantly reducing the cost of equipment and deployment. Dr. Rhee covers the technological development of wired/wireless internet communications in compliance with each iterative generation up to 4G systems, with emphasis on wireless security aspects. By progressing in a systematic matter, presenting the theory and practice of wired/wireless mobile technologies along with various security problems, readers will gain an intimate sense of how mobile internet systems operate and how to address complex security issues. Features: . Written by a top expert in information security. Gives a clear understanding of wired/wireless mobile internet technologies. Presents complete coverage of various cryptographic protocols and specifications needed for 3GPP: AES, KASUMI, Public-key and Elliptic curve cryptography. Forecast new features and promising 4G packet-switched wireless internet technologies for voice and data communications. Provides MIMO/OFDMA-based for 4G systems such as Long Term Evolution (LTE), Ultra Mobile Broadband (UMB), Mobile WiMax or Wireless Broadband (WiBro). Deals with Intrusion Detection System against worm/virus cyber attacks The book ideal for advanced undergraduate and postgraduate students enrolled in courses such as Wireless Access Networking, Mobile Internet Radio Communications. Practicing engineers in industry and research scientists can use the book as a reference to get reacquainted with mobile radio fundamentals or to gain deeper understanding of complex security issues. |
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE | |
Additional physical form available note | Also available in print. |
538 ## - SYSTEM DETAILS NOTE | |
System details note | Mode of access: World Wide Web |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Description based on PDF viewed 10/24/2017. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Wireless Internet |
General subdivision | Security measures. |
655 #0 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | IEEE Xplore (Online Service), |
Relator term | distributor. |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | Wiley, |
Relator term | publisher. |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | Abstract with links to resource |
Uniform Resource Identifier | https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=8039681 |
No items available.