Narrow your search

Library

KBC (1)

KU Leuven (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

UGent (1)

ULB (1)

ULiège (1)

VIVES (1)


Resource type

book (1)


Language

English (1)


Year
From To Submit

2018 (1)

Listing 1 - 1 of 1
Sort by

Book
Inside Radio: An Attack and Defense Guide
Authors: ---
ISBN: 9811084475 9811084467 Year: 2018 Publisher: Singapore : Springer Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book discusses the security issues in a wide range of wireless devices and systems, such as RFID, Bluetooth, ZigBee, GSM, LTE, and GPS. It collects the findings of recent research by the UnicornTeam at 360 Technology, and reviews the state-of-the-art literature on wireless security. The book also offers detailed case studies and theoretical treatments – specifically it lists numerous laboratory procedures, results, plots, commands and screenshots from real-world experiments. It is a valuable reference guide for practitioners and researchers who want to learn more about the advanced research findings and use the off-the-shelf tools to explore the wireless world.

Keywords

Computer science. --- Computer communication systems. --- Computer security. --- Data structures (Computer science). --- Electrical engineering. --- Electronic circuits. --- Computer Science. --- Computer Communication Networks. --- Systems and Data Security. --- Communications Engineering, Networks. --- Signal, Image and Speech Processing. --- Circuits and Systems. --- Data Structures, Cryptology and Information Theory. --- Telecommunication. --- Systems engineering. --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Design and construction --- Protection --- Security measures --- Signal processing. --- Image processing. --- Speech processing systems. --- Electric engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Computational linguistics --- Modulation theory --- Oral communication --- Speech --- Singing voice synthesizers --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Processing, Signal --- Information measurement --- Signal theory (Telecommunication) --- Distributed processing

Listing 1 - 1 of 1
Sort by