Security of mobile communications (Record no. 15876)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01708cam a2200241 a 4500 |
001 - CONTROL NUMBER | |
control field | 15505292 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200907113516.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 081030s2010 flua b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780849379413 (alk. paper) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0849379415 (alk. paper) |
040 ## - CATALOGING SOURCE | |
Transcribing agency | DLC |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 22 |
Item number | B7569 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Boudriga, Noureddine. |
245 10 - TITLE STATEMENT | |
Title | Security of mobile communications |
Statement of responsibility, etc | / Noureddine Boudriga. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | Boca Raton : |
Name of publisher, distributor, etc | CRC Press, |
Date of publication, distribution, etc | 2010 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxxiii, 612 p. : |
Other physical details | ill. ; |
Dimensions | 25 cm. |
500 ## - GENERAL NOTE | |
General note | "An Auerbach book." |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Mobile communication systems |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Wireless communication systems |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Mobile computing |
General subdivision | Security measures. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 1. Section i: basic techniques for mobile communications and security <br/>2. Threats, hacking, and viruses in mobile communications <br/>3. Access control and authentication in mobile communications <br/>4. Common techniques for mobile communications security <br/>5. Smart card security: the sim/usim case <br/>6. Section ii: attack and protection techniques in mobile communication networks <br/>7. Security of gsm networks <br/>8. Security of 3g networks <br/>9. Wireless local area network security <br/>10. Security of ad hoc networks <br/>11. Section iii: security of network-based services in mobile communications <br/>12. Inter-system roaming and internetworking security <br/>13. Securing mobile services <br/>14. Security of mobile sensor networks <br/>15. Security of satellite services <br/>16. Section iv: protection techniques for mobile applications <br/>17. Security of mobile payments <br/>18. Security of mobile voice communications <br/>19. Security of multimedia communications.<br/> |
Withdrawn status | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
UE-Central Library | UE-Central Library | 15.11.2018 | U.E.24322 | 005.8 B7569 | T9880 | 11.01.2019 | 15.11.2018 | Books |