Welcome to UE Central Library

Keep Smiling

Security of mobile communications (Record no. 15876)

MARC details
000 -LEADER
fixed length control field 01708cam a2200241 a 4500
001 - CONTROL NUMBER
control field 15505292
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200907113516.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 081030s2010 flua b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780849379413 (alk. paper)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0849379415 (alk. paper)
040 ## - CATALOGING SOURCE
Transcribing agency DLC
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
Item number B7569
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Boudriga, Noureddine.
245 10 - TITLE STATEMENT
Title Security of mobile communications
Statement of responsibility, etc / Noureddine Boudriga.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boca Raton :
Name of publisher, distributor, etc CRC Press,
Date of publication, distribution, etc 2010
300 ## - PHYSICAL DESCRIPTION
Extent xxxiii, 612 p. :
Other physical details ill. ;
Dimensions 25 cm.
500 ## - GENERAL NOTE
General note "An Auerbach book."
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Mobile communication systems
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Wireless communication systems
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Mobile computing
General subdivision Security measures.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Section i: basic techniques for mobile communications and security <br/>2. Threats, hacking, and viruses in mobile communications <br/>3. Access control and authentication in mobile communications <br/>4. Common techniques for mobile communications security <br/>5. Smart card security: the sim/usim case <br/>6. Section ii: attack and protection techniques in mobile communication networks <br/>7. Security of gsm networks <br/>8. Security of 3g networks <br/>9. Wireless local area network security <br/>10. Security of ad hoc networks <br/>11. Section iii: security of network-based services in mobile communications <br/>12. Inter-system roaming and internetworking security <br/>13. Securing mobile services <br/>14. Security of mobile sensor networks <br/>15. Security of satellite services <br/>16. Section iv: protection techniques for mobile applications <br/>17. Security of mobile payments <br/>18. Security of mobile voice communications <br/>19. Security of multimedia communications.<br/>
Holdings
Withdrawn status Damaged status Not for loan Home library Current library Date acquired Source of acquisition Full call number Barcode Date last seen Price effective from Koha item type
      UE-Central Library UE-Central Library 15.11.2018 U.E.24322 005.8 B7569 T9880 11.01.2019 15.11.2018 Books
Copyright © 2023, University of Education, Lahore. All Rights Reserved.
Email:centrallibrary@ue.edu.pk