Wiley (6-2002) | PDF | 265 pages | 0470844930 | 20.6Mb Security for Ubiquitous Computing /by Frank Stajano. Twenty or even ten years ago, computer security was a marginal speciality for geeks who liked to obsess about things like enciphering email. Nowadays, it is centre stage. Cyberterrorism and electronic fraud are the subject of hand-wringing press articles; but that’s only the beginning. Financial and political power are now largely exercised through networked systems. Cash machine and credit card networks decide whether you can get money; burglar alarm networks decidwe hether the policew ill come to your house; identifyfriend- or-foe systems tell the military which aircraft might be worth intercepting. Most of the investment in cryptography and computer security goes to ensure that these sinews of civilisation will continue to perform dependably in the way that their builders envisaged. * Ubiquitous computing refers to computers embedded in everyday devices communicating with each other over ad-hoc wireless networks * Focuses on two very hot topics: ad-hoc wireless networking and security * Covers security issues for well-established and widely used technologies such as GSM, Bluetooth, and IP * Presents a framework to make sense of the many and varied issues at stake, a taxonomy of the major problems and in-depth discussion of some specific, cutting-edge solutions * Includes a primer on security and the basics of cryptography * Describes the security issues in "peer-to-peer networking," a new technology that is gaining prominence in the media with applications such as Napster and ICQ Chat download link: http://depositfiles.com/files/j1rdaph5w http://www.filesonic.com/file/53099033 http://www.easy-share.com/1913483280
|