My Account Details

ISBN10: 0071782583 | ISBN13: 9780071782586

Step 1 . Download Adobe Digital Editions to your PC or Mac desktop/laptop.
Step 2. Register and authorize your Adobe ID (optional). To access your eBook on multiple devices, first create an Adobe ID at account.adobe.com. Then, open Adobe Digital Editions, go to the Help menu, and select "Authorize Computer" to link your Adobe ID.
Step 3. Open Your eBook. Use Adobe Digital Editions to open the file. If the eBook doesn’t open, contact customer service for assistance.
The authoritative, general reference that has been sorely missing in the field of mobile computing This book teaches all the main topics via the hottest applications in a rapidlygrowing field. "Big picture" explanations of ad hoc networks and service discovery Exercises, projects, and solutions to illustrate core concepts Extensive wireless security methodologies
Chapter 1: Mobile Adaptive ComputingChapter 2: Mobility ManagementChapter 3: Data Dissemination and ManagementChapter 4: Context-Aware ComputingChapter 5: Introduction to Mobile MiddlewareChapter 6: Middleware for Application Development: Adaptation and AgentsChapter 7: Service Discovery Middleware: Finding Needed Services Chapter 8: Introduction to Ad Hoc and Sensor NetworksChapter 9: ChallengesChapter 10: ProtocolsChapter 11: Approaches and SolutionsChapter 12: Wireless SecurityChapter 13: Approaches to SecurityChapter 14: Security in Wireless Personal Area NetworksChapter 15: Security in Wireless Local Area NetworksChapter 16: Security in Wireless Metropolitan Area Networks (802.16)Chapter 17: Security in Wide Area NetworksAPPENDIX A: BRIEF INTRODUCTION TO WIRELESS COMMUNICATION AND NETWORKINGAPPENDIX B: QUESTIONSINDEXBIBLIOGRAPHYGLOSSARYREFERENCES
Chapter 3: Data Dissemination and ManagementChapter 4: Context-Aware ComputingChapter 5: Introduction to Mobile MiddlewareChapter 6: Middleware for Application Development: Adaptation and AgentsChapter 7: Service Discovery Middleware: Finding Needed Services Chapter 8: Introduction to Ad Hoc and Sensor NetworksChapter 9: ChallengesChapter 10: ProtocolsChapter 11: Approaches and SolutionsChapter 12: Wireless SecurityChapter 13: Approaches to SecurityChapter 14: Security in Wireless Personal Area NetworksChapter 15: Security in Wireless Local Area NetworksChapter 16: Security in Wireless Metropolitan Area Networks (802.16)Chapter 17: Security in Wide Area NetworksAPPENDIX A: BRIEF INTRODUCTION TO WIRELESS COMMUNICATION AND NETWORKINGAPPENDIX B: QUESTIONSINDEXBIBLIOGRAPHYGLOSSARYREFERENCES
Chapter 5: Introduction to Mobile MiddlewareChapter 6: Middleware for Application Development: Adaptation and AgentsChapter 7: Service Discovery Middleware: Finding Needed Services Chapter 8: Introduction to Ad Hoc and Sensor NetworksChapter 9: ChallengesChapter 10: ProtocolsChapter 11: Approaches and SolutionsChapter 12: Wireless SecurityChapter 13: Approaches to SecurityChapter 14: Security in Wireless Personal Area NetworksChapter 15: Security in Wireless Local Area NetworksChapter 16: Security in Wireless Metropolitan Area Networks (802.16)Chapter 17: Security in Wide Area NetworksAPPENDIX A: BRIEF INTRODUCTION TO WIRELESS COMMUNICATION AND NETWORKINGAPPENDIX B: QUESTIONSINDEXBIBLIOGRAPHYGLOSSARYREFERENCES
Chapter 7: Service Discovery Middleware: Finding Needed Services Chapter 8: Introduction to Ad Hoc and Sensor NetworksChapter 9: ChallengesChapter 10: ProtocolsChapter 11: Approaches and SolutionsChapter 12: Wireless SecurityChapter 13: Approaches to SecurityChapter 14: Security in Wireless Personal Area NetworksChapter 15: Security in Wireless Local Area NetworksChapter 16: Security in Wireless Metropolitan Area Networks (802.16)Chapter 17: Security in Wide Area NetworksAPPENDIX A: BRIEF INTRODUCTION TO WIRELESS COMMUNICATION AND NETWORKINGAPPENDIX B: QUESTIONSINDEXBIBLIOGRAPHYGLOSSARYREFERENCES
Chapter 9: ChallengesChapter 10: ProtocolsChapter 11: Approaches and SolutionsChapter 12: Wireless SecurityChapter 13: Approaches to SecurityChapter 14: Security in Wireless Personal Area NetworksChapter 15: Security in Wireless Local Area NetworksChapter 16: Security in Wireless Metropolitan Area Networks (802.16)Chapter 17: Security in Wide Area NetworksAPPENDIX A: BRIEF INTRODUCTION TO WIRELESS COMMUNICATION AND NETWORKINGAPPENDIX B: QUESTIONSINDEXBIBLIOGRAPHYGLOSSARYREFERENCES
Chapter 11: Approaches and SolutionsChapter 12: Wireless SecurityChapter 13: Approaches to SecurityChapter 14: Security in Wireless Personal Area NetworksChapter 15: Security in Wireless Local Area NetworksChapter 16: Security in Wireless Metropolitan Area Networks (802.16)Chapter 17: Security in Wide Area NetworksAPPENDIX A: BRIEF INTRODUCTION TO WIRELESS COMMUNICATION AND NETWORKINGAPPENDIX B: QUESTIONSINDEXBIBLIOGRAPHYGLOSSARYREFERENCES
Chapter 13: Approaches to SecurityChapter 14: Security in Wireless Personal Area NetworksChapter 15: Security in Wireless Local Area NetworksChapter 16: Security in Wireless Metropolitan Area Networks (802.16)Chapter 17: Security in Wide Area NetworksAPPENDIX A: BRIEF INTRODUCTION TO WIRELESS COMMUNICATION AND NETWORKINGAPPENDIX B: QUESTIONSINDEXBIBLIOGRAPHYGLOSSARYREFERENCES
Chapter 15: Security in Wireless Local Area NetworksChapter 16: Security in Wireless Metropolitan Area Networks (802.16)Chapter 17: Security in Wide Area NetworksAPPENDIX A: BRIEF INTRODUCTION TO WIRELESS COMMUNICATION AND NETWORKINGAPPENDIX B: QUESTIONSINDEXBIBLIOGRAPHYGLOSSARYREFERENCES
Chapter 17: Security in Wide Area NetworksAPPENDIX A: BRIEF INTRODUCTION TO WIRELESS COMMUNICATION AND NETWORKINGAPPENDIX B: QUESTIONSINDEXBIBLIOGRAPHYGLOSSARYREFERENCES
APPENDIX B: QUESTIONSINDEXBIBLIOGRAPHYGLOSSARYREFERENCES
BIBLIOGRAPHYGLOSSARYREFERENCES
REFERENCES
Need support? We're here to help - Get real-world support and resources every step of the way.