|
Securing Wireless Communications at the Physical Layer |
|
|
Категория: Компьютерная литература » Безопасность » Безопасность, взлом |
|
|
| |
|
|
Автор: колллектив Springer
Издательство: Springer
Год издания: 2010
isbn: 978-1-4419-1384-5
Количество страниц: 402
Язык: english
Формат: PDF
|
The book focuses on a recently emerging topic in security. Specifically, the book focuses on physical layer security. Whereas conventional security mechanisms involve cryptography that operates at higher layers of the protocol stack, the methods described in this book secure communications at the physical layer. The area of physical layer security is an emerging field of research that has seen an explosion of research in the past few years. This trend is only expected to continue as there is a growing need to secure wireless communications without conventional cryptographic network security protocols. The proposed book will consist of contributions from roughly a dozen of the leading research groups in this emerging area. For the first time, important results will be collected together. Important topics will include the secrecy rate of MIMO wireless systems, practical codes for the dissemination of secrets, and authentication of wireless transmitters using waveform-level properties. |
|
|
|
|
|
Practical Digital Wireless Signals |
|
|
Категория: Internet, Компьютерные сети |
|
|
| |
|
|
Автор: Earl McCune
Издательство: Cambridge University Press
Год издания: 2010
isbn: 978-0-511-67538-6
Количество страниц: 434
Язык: english
Формат: PDF
|
Do you need to know what signal type to select for a wireless application? Quickly develop a useful expertise in digital modulation with this practical guide, based on the author's experience of over 30 years in industrial design. You will understand the physical meaning behind the mathematics of wireless signals and learn the intricacies and tradeoffs in signal selection and design. Six modulation families and 12 modulation types are covered in depth, together with a quantitative ranking of relative cost incurred to implement any of 12 modulation types. Extensive discussions of the Shannon Limit, Nyquist filtering, efficiency measures and signal-to-noise measures are provided, radio wave propagation and antennas, multiple access techniques, and signal coding principles are all covered, and spread spectrum and wireless system operation requirements are presented. |
|
|
|
|
|
Network Know-How: An Essential Guide for the Accidental Admin |
|
|
Категория: Компьютерная литература » Телекоммуникационные технологии » Компьютерные сети |
|
|
| |
|
|
Автор: John Ross
Издательство: No Starch Press
Год издания: 2009
isbn: 978-1-59327-191-6
Количество страниц: 288
Язык: english
Формат: PDF
|
Network Know-How is a straight to the point description of networks, what they do, how they operate, and how to manage them. The book is largely free of jargon and arcane, obscure terminology. Of course, normal network lingo has a certain amount of jargon, but the author does a good job of laying out the essentials in an easy to understand format.
Wired and wireless networks are covered, and good advice is given on securing wireless networks. Router functions are described in detail, the basics of using network file servers and network attached storage are documented. Instructions on setting up network access in Windows XP, Vista, Leopard, and Linux are provided. There is some basic information on a few of the network tools that provide problem solving abilities, such as IpConfig, ping, and TraceRoute.
There is a section on home entertainment, including setting up a media center, attaching a TIVO, and attaching your game console, such as a WII, PlayStation, or Xbox 360 to your network.
Finally, there is a brief outline of what to do when things don't work, a troubleshooting section. It is rudimentary, but does provide a place to start when you have a problem. A 14 page index is included.
This is an excellent reference for the occasional network administrator, or as the subtitle says, the "accidental admin." Those who work in network administration will not find much in this book of interest, and those looking for more detail should look elsewhere. Recommended for its target audience. |
|
|
|
|
|