View Single Post
Tuổi 26-06-2012, 12:09 PM   #5
chaoxin363
Newbie
 
Gia nhập: Jun 2012
Trả Lời: 1
Nguyên văn bởi hoctinhoc Xem Bài Gởi

Tong hop cac sach ve Wireless


Gioi thieu voi cac ban cac sach tham khao ve Wireless Networking

1. Advanced Wired And Wireless Networking


Quote:
http://www.mediafire.com/?sharekey=a...018c8114394287
2. 802.11 WLANs and IP Networking Security QoS and Mobility

Quote:
http://www.mediafire.com/?sharekey=a...018c8114394287
3. Ad Hoc Networks Technologies And Protocols

Quote:
http://www.mediafire.com/?sharekey=a...eada0a1ae8665a
4. Building Secure Wireless Networks with 802.11

Quote:
http://www.mediafire.com/?sharekey=a...21d66e282a0ee8
5. Fundamentals of Wireless Communication

Quote:
http://www.mediafire.com/?sharekey=a...e6ba49b5870170
6. Secure Roaming in 802.11 Networks

Quote:
http://www.mediafire.com/?sharekey=a...5965eaa7bc68bc




WIRELESS MESH NETWORKING Architectures, Protocols and Standards

Edited by
Yan Zhang - Jijun Luo - Honglin Hu

CONTENTS

PART I: ARCHITECTURES

1 Wireless Mesh Networks: Issues and Solutions

2 Multiradio Multichannel Mesh Networks

3 IEEE 802.11-Based Wireless Mesh Networks

PART II: PROTOCOLS

4 Routing in Wireless Mesh Networks

5 Medium Access Control in Wireless Mesh Networks

6 Security in Wireless Mesh Networks

7 Scalability in Wireless Mesh Networks

8 Load Balancing in Wireless Mesh Networks

9 Cross-Layer Optimization for Scheduling in Wireless Mesh Networks

10 Multimedia Communications over Wireless Mesh Networks

11 Multiple Antenna Techniques for Wireless Mesh Networks

PART III: STANDARDIZATION AND ENABLING TECHNOLOGIES

12 Standardization of Wireless LAN Mesh Networks in IEEE 802.11s

13 IEEE 802.16 WiMAX Mesh Networking

14 Cognitive Radio and Dynamic Spectrum Management

15 Wireless Mesh Networks Case Study: Fire Emergency Management and Market Analysis

16 Wireless Mesh Networks for Public Safety and Disaster Recovery Applications


Download


Wireless Networks First-Step


Chapter 1. The Wireless World: An Introduction to Concepts

Chapter 2. Wireless System Architecture: How Wireless Works

Chapter 3. Radio Frequency and Light Signal Fundamentals: The Invisible Medium

Chapter 4. Wireless PANs: Networks for Small Places

Chapter 5. Wireless LANs: Networks for Buildings and Campuses

Chapter 6. Wireless MANs: Networks for Connecting Buildings and Remote Areas

Chapter 7. Wireless WANs: Networks for Worldwide Connections

Chapter 8. Wireless Network Security: Protecting Information Resources

Download



Handbook of Research on Wireless Security


Section I. Security Fundamentals
- Chapter I. Malicious Software in Mobile Devices
- Chapter II. Secure Service Discovery
- Chapter III. Security of Mobile Code
- Chapter IV. Identity Management
- Chapter V. Wireless Wardriving
- Chapter VI. Intrusion and Anomaly Detection in Wireless Networks
- Chapter VII. Peer-to-Peer (P2P) Network Security: Firewall Issues
- Chapter VIII. Identity Management for Wireless Service Access
- Chapter IX. Privacy Enhancing Techniques: A Survey and Classification
- Chapter X. Vulnerability Analysis and Defenses in Wireless Networks
- Chapter XI. Key Distribution and Management for Mobile Applications
- Chapter XII. Architecture and Protocols for Authentications, Authorization, and Accounting (AAA) in the Future Wireless Communications Networks
- Chapter XIII. Authentication, Authorisation, and Access Control in Mobile Systems
- Chapter XIV. Trustworthy Networks, Authentication, Privacy, and Security Models
- Chapter XV. The Provably Secure Formal Methods for Authentication and Key Agreement Protocols
- Chapter XVI. Multimedia Encryption and Watermarking in Wireless Environment
- Chapter XVII. System-on-Chip Design of the Whirlpool Hash Function

Section II.Security in 3G/B3G/4G

- Chapter XVIII. Security in 4G
- Chapter XIX. Security Architectures for B3G Mobile Networks
- Chapter XX. Security in UMTS 3G Mobile Networks
- Chapter XXI. Access Security in UMTS and IMS
- Chapter XXII. Security in 2.5G Mobile Systems
- Chapter XXIII. End-to-End Security Comparisons Between IEEE 802.16e and 3G Technologies
- Chapter XXIV. Generic Application Security in Current and Future Networks
- Chapter XXV. Authentication, Authorization, and Accounting (AAA) Framework in Network Mobility (NEMO) Environments

Section III.Security in Ad Hoc and Sensor Networks

- Chapter XXVI.Security in Mobile Ad Hoc Networks
- Chapter XXVII. Privacy and Anonymity in Mobile Ad Hoc Networks
- Chapter XXVIII. Secure Routing with Reputation in MANET
- Chapter XXIX. Trust Management and Context-Driven Access Control
- Chapter XXX. A Survey of Key Management in Mobile Ad Hoc Networks
- Chapter XXXI. Security Measures for Mobile Ad-Hoc Networks (MANETs)
- Chapter XXXII. A Novel Secure Video Surveillance System Over Wireless Ad-Hoc Networks
- Chapter XXXIII. Cutting the Gordian Knot: Intrusion Detection Systems in Ad Hoc Networks
- Chapter XXXIV. Security in Wireless Sensor Networks
- Chapter XXXV. Security and Privacy in Wireless Sensor Networks: Challenges and Solutions
- Chapter XXXVI. Routing Security in Wireless Sensor Networks
- Chapter XXXVII. Localization Security in Wireless Sensor Networks
- Chapter XXXVIII. Resilience Against False Data Injection Attack in Wireless Sensor Networks
- Chapter XXXIX. Survivability of Sensors with Key and Trust Management
- Chapter XL. Fault Tolerant Topology Design for Ad Hoc and Sensor Networks

Section IV. Security in Wireless PAN/LAN/MAN Networks


- Chapter XLI. Evaluating Security Mechanisms in Different Protocol Layers for Bluetooth Connections
- Chapter XLII. Bluetooth Devices Effect on Radiated EMS of Vehicle Wiring
- Chapter XLIII. Security in WLAN
- Chapter XLIV. Access Control in Wireless Local Area Networks: Fast Authentication Schemes
- Chapter XLV. Security and Privacy in RFID Based Wireless Networks
- Chapter XLVI. Security and Privacy Approaches for Wireless Local and Metropolitan Area Networks (LANs & MANS)
- Chapter XLVII. End-to-End (E2E) Security Approach in WiMAX:A Security Technical Overview for Corporate Multimedia Applications
- Chapter XLVIII. Evaluation of Security Architectures for Mobile Broadband Access
- Chapter XLIX. Extensible Authentication (EAP) Protocol Integrations in the Next eneration Cellular Networks

Download







Tin tay trong – Tiếp thị liên kết với Dienmay.com

Theo nguồn tin từ một anh bạn làm việc tại Dienmay.com (Thuộc thegioididong.com, hiện tại Dienmay.com đang triển khai một chương trình tiếp thị liên kết (Affiliate Marketing) khá hoành tráng.



Cũng như Lienket123.com, chương trình không cho phép đăng ký thành viên trực tiếp mà phải thông qua người giới thiệu. Việc này sẽ tạo điều kiện thuận lợi cho bạn xây dựng đội ngũ tuyến dưới.

Để có hướng dẫn chi tiết và tham gia chương trình bạn hãy nhắn tin theo cú pháp

GD huongdan gửi đến 8090
(500 VND / tin nhắn)

Chương trình vẫn chưa chính thức triển khai và vẫn trong giai đoạn khảo sát, xây dựng hệ thống. Bạn có thể tranh thủ cơ hội này để xây dựng một đội ngũ tuyến dưới (Sub-Affiliate) hoành tráng.

Chúc bạn thành công!
chaoxin363 vắng mặt   Trả lời ngay kèm theo trích dẫn này