000 03784nam a22006495i 4500
001 978-981-10-8447-8
003 DE-He213
005 20210201191447.0
007 cr nn 008mamaa
008 180319s2018 si | s |||| 0|eng d
020 _a9789811084478
_9978-981-10-8447-8
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM075000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
100 1 _aYang, Qing.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aInside Radio: An Attack and Defense Guide
_h[electronic resource] /
_cby Qing Yang, Lin Huang.
250 _a1st ed. 2018.
264 1 _aSingapore :
_bSpringer Singapore :
_bImprint: Springer,
_c2018.
300 _aXIX, 369 p. 363 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
500 _aAcceso multiusuario
505 0 _aChapter1 Overview of wireless security -- Chapter 2 RFID security -- Chapter 3 Wireless system in 433/315 MHz band -- Chapter 4 Aviation radios -- Chapter 5 Bluetooth related -- Chapter 6 Zigbee -- Chapter 7 Cellular network -- Chapter 8 Satellite communication -- Chapter 9 Hacking tool introduction.
520 _aThis book discusses the security issues in a wide range of wireless devices and systems, such as RFID, Bluetooth, ZigBee, GSM, LTE, and GPS. It collects the findings of recent research by the UnicornTeam at 360 Technology, and reviews the state-of-the-art literature on wireless security. The book also offers detailed case studies and theoretical treatments - specifically it lists numerous laboratory procedures, results, plots, commands and screenshots from real-world experiments. It is a valuable reference guide for practitioners and researchers who want to learn more about the advanced research findings and use the off-the-shelf tools to explore the wireless world.
541 _fUABC ;
_cTemporal ;
_d01/01/2021-12/31/2023.
650 0 _aComputer communication systems.
650 0 _aComputer security.
650 0 _aElectrical engineering.
650 0 _aSignal processing.
650 0 _aImage processing.
650 0 _aSpeech processing systems.
650 0 _aElectronic circuits.
650 0 _aData structures (Computer science).
650 1 4 _aComputer Communication Networks.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I13022
650 2 4 _aSystems and Data Security.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I28060
650 2 4 _aCommunications Engineering, Networks.
_0https://scigraph.springernature.com/ontologies/product-market-codes/T24035
650 2 4 _aSignal, Image and Speech Processing.
_0https://scigraph.springernature.com/ontologies/product-market-codes/T24051
650 2 4 _aCircuits and Systems.
_0https://scigraph.springernature.com/ontologies/product-market-codes/T24068
650 2 4 _aData Structures and Information Theory.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I15009
700 1 _aHuang, Lin.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811084461
776 0 8 _iPrinted edition:
_z9789811084485
776 0 8 _iPrinted edition:
_z9789811341533
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=https://doi.org/10.1007/978-981-10-8447-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cLIBRO_ELEC
999 _c243742
_d243741