My Account Details

ISBN10: 0071399437 | ISBN13: 9780071399432

Step 1 . Download Adobe Digital Editions to your PC or Mac desktop/laptop.
Step 2. Register and authorize your Adobe ID (optional). To access your eBook on multiple devices, first create an Adobe ID at account.adobe.com. Then, open Adobe Digital Editions, go to the Help menu, and select "Authorize Computer" to link your Adobe ID.
Step 3. Open Your eBook. Use Adobe Digital Editions to open the file. If the eBook doesn’t open, contact customer service for assistance.
Chapter 1
Why is Wireless Different? Chapter 2
Wireless Information Warfare Chapter 3
Telephone System Vulnerabilities Chapter 4
Satellite Communications Chapter 5
Cryptographic Security Chapter 6
Speech Cryptology Chapter 7
The Wireless Local Area Network (WLAN) Chapter 8
Wireless Application Protocol (WAP) Chapter 9
Wireless Transport Layer Security (WTLS) Chapter 10
Bluetooth Chapter 11
Voice Over Internet Protocol Chapter 12
Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications Chapter 13
Optimizing Wireless Security with FPGAs and ASICs Bibliography Index
Wireless Information Warfare
Chapter 3
Telephone System Vulnerabilities Chapter 4
Satellite Communications Chapter 5
Cryptographic Security Chapter 6
Speech Cryptology Chapter 7
The Wireless Local Area Network (WLAN) Chapter 8
Wireless Application Protocol (WAP) Chapter 9
Wireless Transport Layer Security (WTLS) Chapter 10
Bluetooth Chapter 11
Voice Over Internet Protocol Chapter 12
Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications Chapter 13
Optimizing Wireless Security with FPGAs and ASICs Bibliography Index
Satellite Communications
Chapter 5
Cryptographic Security Chapter 6
Speech Cryptology Chapter 7
The Wireless Local Area Network (WLAN) Chapter 8
Wireless Application Protocol (WAP) Chapter 9
Wireless Transport Layer Security (WTLS) Chapter 10
Bluetooth Chapter 11
Voice Over Internet Protocol Chapter 12
Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications Chapter 13
Optimizing Wireless Security with FPGAs and ASICs Bibliography Index
Speech Cryptology
Chapter 7
The Wireless Local Area Network (WLAN) Chapter 8
Wireless Application Protocol (WAP) Chapter 9
Wireless Transport Layer Security (WTLS) Chapter 10
Bluetooth Chapter 11
Voice Over Internet Protocol Chapter 12
Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications Chapter 13
Optimizing Wireless Security with FPGAs and ASICs Bibliography Index
Wireless Application Protocol (WAP)
Chapter 9
Wireless Transport Layer Security (WTLS) Chapter 10
Bluetooth Chapter 11
Voice Over Internet Protocol Chapter 12
Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications Chapter 13
Optimizing Wireless Security with FPGAs and ASICs Bibliography Index
Bluetooth
Chapter 11
Voice Over Internet Protocol Chapter 12
Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications Chapter 13
Optimizing Wireless Security with FPGAs and ASICs Bibliography Index
Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications
Chapter 13
Optimizing Wireless Security with FPGAs and ASICs Bibliography Index
Index
Need support? We're here to help - Get real-world support and resources every step of the way.