Bluetooth Security

Bluetooth Security

Bluetooth Security

Bluetooth Security

Hardcover(New Edition)

$98.00 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Related collections and offers


Overview

This first-of-its-kind book, from expert authors actively contributing to the evolution of Bluetooth specifications, provides an overview and detailed descriptions of all the security functions and features of this standard's latest core release. After categorizing all the security issues involved in ad hoc networking, this hands-on volume shows you how to design a highly secure Bluetooth system and implement security enhancements. The book also helps you fully understand the main security risks involved with introducing Bluetooth-based communications in your organization.


Product Details

ISBN-13: 9781580535045
Publisher: Artech House, Incorporated
Publication date: 07/28/2004
Series: Artech House Computer Security Ser.
Edition description: New Edition
Pages: 222
Product dimensions: 6.10(w) x 9.10(h) x 0.70(d)

About the Author

Christian Gehrmann is senior specialist, security architectures & protocols for Ericsson Mobile Platforms AB. He was the Chairman of the Bluetooth SIG Security Expert Group during 2001 and 2002. Dr. Gehrmann holds a Ph.D. in information theory and an M.Sc. in electronic engineering from Lund University. Joakim Persson is a technical manager of New Technology at the research department of Ericsson Mobile Platforms AB. He has been playing an active role in the Bluetooth SIG Radio Working Group for many years. Dr. Persson holds a Ph.D. in information theory and an M.Sc. in computer engineering from Lund University. Ben Smeets is an Ericsson expert in security systems and data compression at Ericsson Mobile Platforms AB. He is also full professor in digital switching theory at Lund University. Dr. Smeets holds a Docent degree and Ph.D. in digital techniques from Lund University and an M.Sc. in electrical engineering from Eindhoven Technical University.

Table of Contents

Preface. Part I: Bluetooth Security Basics - Introduction. Overview of Bluetooth Security Architecture. Key Management. Algorithms. Broadcast Encryption. Security Policies and Access Control. Attacks, Weaknesses and Strengths. Part II: Bluetooth Security Enhancements - Introducing Anonymity. Key Management Extensions. Security for Bluetooth Applications.

From the B&N Reads Blog

Customer Reviews