Security in wireless mesh networks
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, l...
Saved in:
| Other Authors: | Zhang, Yan (Editor), Zheng, Jun (Editor), Hu, Honglin (Editor) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boca Raton, FL
CRC Press
2009
|
| Series: | Wireless networks and mobile communications
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Wireless networks multiuser detection in cross-layer design
by: Comaniciu
Published: (2005)
by: Comaniciu
Published: (2005)
Wireless networks and security issues, challenges and research trends
Published: (2013)
Published: (2013)
Wireless communications security
by: Imai
Published: (2005)
by: Imai
Published: (2005)
Wireless communications security
by: Imai
Published: (2005)
by: Imai
Published: (2005)
Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing
by: Buttyan, Levente
Published: (2008)
by: Buttyan, Levente
Published: (2008)
Hacking exposed wireless wireless security secrets & solutions
by: Wright, Joshua, et al.
Published: (2015)
by: Wright, Joshua, et al.
Published: (2015)
CWSP guide to wireless security
Published: (2007)
Published: (2007)
Security in wireless LANs and MANs
by: Hardjono
Published: (2005)
by: Hardjono
Published: (2005)
Security for mobile networks and platforms
by: Aissi
Published: (2006)
by: Aissi
Published: (2006)
A comprehensive guide to 5G security
Published: (2018)
Published: (2018)
Wireless networked communications concepts technology and implementation
by: BateslhRegis J.
by: BateslhRegis J.
Guide to wireless network security
by: Vacca, John R.
Published: (2006)
by: Vacca, John R.
Published: (2006)
Handbook of wireless networks and mobile computing
Published: (2002)
Published: (2002)
Cisco router and switch forensics investigating and analyzing malicious network activity
by: Liu, Dale
Published: (2009)
by: Liu, Dale
Published: (2009)
Wireless communications
by: Singal, T. L.
Published: (2010)
by: Singal, T. L.
Published: (2010)
Security and data reliability in cooperative wireless networks
by: Hassan, Emad S.
Published: (2018)
by: Hassan, Emad S.
Published: (2018)
Wireless communications security
by: Imai 1943-
Published: (2006)
by: Imai 1943-
Published: (2006)
Hacking exposed wireless wireless security secrets & solutions /
by: Cache, Johnny
Published: (2007)
by: Cache, Johnny
Published: (2007)
Hacking exposed wireless wireless security secrets & solutions
by: Cache, Johnny
Published: (2010)
by: Cache, Johnny
Published: (2010)
Security in an IPv6 environment
by: Minoli, Daniel 1952-
Published: (2009)
by: Minoli, Daniel 1952-
Published: (2009)
Wireless ad hoc and sensor networks protocols, performance, and control
by: Sarangapani, Jagannathan
Published: (2007)
by: Sarangapani, Jagannathan
Published: (2007)
Network security know it all
Published: (2008)
Published: (2008)
Wireless security and cryptography specifications and implementations
Published: (2007)
Published: (2007)
Applied network security master the art of detecting and averting advanced network security attacks and techniques
by: Salmon, Arthur, et al.
Published: (2017)
by: Salmon, Arthur, et al.
Published: (2017)
Network security how to plan for it and achieve it
by: Baker
Published: (1995)
by: Baker
Published: (1995)
Network security architectures
by: Convery, Sean
Published: (2012)
by: Convery, Sean
Published: (2012)
Network Security Fundamentals
Published: (2008)
Published: (2008)
Network security current status and future directions
by: Douligeris
Published: (2007)
by: Douligeris
Published: (2007)
The management of network security technology, design, and management control
by: Carr, Houston H. 1937-
Published: (2010)
by: Carr, Houston H. 1937-
Published: (2010)
Guide to network security
by: Whitman, Michael E., et al.
Published: (2013)
by: Whitman, Michael E., et al.
Published: (2013)
Wireless network security a beginner's guide
by: Wrightson, Tyler
Published: (2012)
by: Wrightson, Tyler
Published: (2012)
Honeypots a new paradigm to information security
by: Joshi, R.C
Published: (2011)
by: Joshi, R.C
Published: (2011)
Network security through data analysis from data to action
by: Collins, Michael (Michael Patrick)
Published: (2017)
by: Collins, Michael (Michael Patrick)
Published: (2017)
Network security in the 90's issues and solutions for managers
by: Madron, Thomas William 1937-
Published: (1992)
by: Madron, Thomas William 1937-
Published: (1992)
Network security first step
by: Thomas ,Tom
Published: (2004)
by: Thomas ,Tom
Published: (2004)
Business data networks and security
by: Panko, Raymond R., et al.
Published: (2015)
by: Panko, Raymond R., et al.
Published: (2015)
Network security essentials applications and standards
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Network security essentials applications and standards
by: Stallings, William
Published: (2007)
by: Stallings, William
Published: (2007)
Network and internetwork security principles and practice
by: Stallings, William
Published: (1995)
by: Stallings, William
Published: (1995)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Similar Items
-
Wireless networks multiuser detection in cross-layer design
by: Comaniciu
Published: (2005) -
Wireless networks and security issues, challenges and research trends
Published: (2013) -
Wireless communications security
by: Imai
Published: (2005) -
Wireless communications security
by: Imai
Published: (2005) -
Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing
by: Buttyan, Levente
Published: (2008)


