Fundamentals of Mobile and Pervasive Computing
The authoritative, general reference that has been sorely missing in the field of mobile computing

This book teaches all the main topics via the hottest applications in a rapidlygrowing field.

  • "Big picture" explanations of ad hoc networks and service discovery
  • Exercises, projects, and solutions to illustrate core concepts
  • Extensive wireless security methodologies
  • "1101917019"
    Fundamentals of Mobile and Pervasive Computing
    The authoritative, general reference that has been sorely missing in the field of mobile computing

    This book teaches all the main topics via the hottest applications in a rapidlygrowing field.

  • "Big picture" explanations of ad hoc networks and service discovery
  • Exercises, projects, and solutions to illustrate core concepts
  • Extensive wireless security methodologies
  • 67.49 In Stock
    Fundamentals of Mobile and Pervasive Computing

    Fundamentals of Mobile and Pervasive Computing

    Fundamentals of Mobile and Pervasive Computing

    Fundamentals of Mobile and Pervasive Computing

    eBook

    $67.49  $89.96 Save 25% Current price is $67.49, Original price is $89.96. You Save 25%.

    Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
    WANT A NOOK?  Explore Now

    Related collections and offers


    Overview

    The authoritative, general reference that has been sorely missing in the field of mobile computing

    This book teaches all the main topics via the hottest applications in a rapidlygrowing field.

  • "Big picture" explanations of ad hoc networks and service discovery
  • Exercises, projects, and solutions to illustrate core concepts
  • Extensive wireless security methodologies

  • Product Details

    ISBN-13: 9780071782586
    Publisher: McGraw Hill LLC
    Publication date: 01/20/2005
    Series: Telecom Engineering
    Sold by: Barnes & Noble
    Format: eBook
    Pages: 404
    File size: 6 MB

    About the Author

    Frank Adelstein has been working with computers for over 20 years. His research interests are broad, and include mobile computing, wireless communication, real-time networking, and computer security. Dr. Adelstein holds a B.S. degree in Computer Engineering from the University of Michigan, and an M.S. and Ph.D. in Computer Science from The Ohio State University. He held a postdoctoral research position with the Cornell Computer Science Department, working with the Xerox Design Research Institute. Currently, he is a Senior Principal Scientist with ATC-NY (formerly Odyssey Research Associates), and has been with them since 1999. While there, his work has focused on computer security, ranging from computer forensics, and intrusion detection, to red-teaming and penetration testing. He is a GIAC certified forensic analyst. In his "copious free time," he enjoys playing ultimate frisbee, doodling, and flying around the Finger Lakes region of New York State. He holds a commercial pilot's license for land and sea planes.

    Sandeep Kumar S. Gupta received the B.Tech degree in Computer Science and Engineering (CSE) from Institute of Technology, Banaras Hindu University, Varanasi, India, the M.Tech. degree in CSE from Indian Institute of Technology, Kanpur, and the M.S. and the Ph.D. degree in Computer and Information Science from The Ohio State University, Columbus, OH. He has served at Duke University, Durham, NC as a post-doctoral researcher; at Ohio University, Athens, OH as a Visiting Assistant Professor; and at Colorado State University, Ft. Collins, CO as an Assistant Professor. Since 2001 he has been a faculty member at Arizona State University, Tempe, AZ, where he is an Associate Professor in the Department of Computer Science and Engineering at Ira A. Fulton School of Engineering. His current research is focused on dependable and adaptive distributed systems with emphasis on wireless sensor networks, mobile computing, and biomedical applications. His research has been funded by the National Science Foundation (NSF) and the Consortium for Embedded Inter-Networking Technologies (CEINT). He is a member of ACM and a senior member of IEEE. For information about his recent research projects visit http://shamir.eas.asu.edu/-mcn.

    Golden G. Richard III was born in 1964 in Jennings, LA. His research interests are in mobile computing, operating systems internals, and computer security, particularly digital forensics. Dr. Richard holds a B.S. degree from the University of New Orleans and M.S. and Ph.D. degrees from The Ohio State University, all in Computer Science. Currently, he is an Associate Professor in the Department of Computer Science at the University of New Orleans. He is also CTO and co-founder of Digital Forensics Solutions and a GIAC certified forensic analyst. Dr. Richard is the author of Service and Device Discovery: Protocols and Programming, published by McGraw-Hill in 2002. When he's not hacking, he can be found in his garden, covered in dirt, preparing a tasty dish or consuming jazz.

    Loren Schwiebert received the B.S. degree in Computer Science (with a dual major in Mathematics) from Heidelberg College, Tiffin, OH, and the M.S. and Ph.D. degrees in Computer and Information Science from The Ohio State University, Columbus, OH. Since 1995 he has been a faculty member at Wayne State University, Detroit, MI, where he is currently an Associate Professor in the Department of Computer Science and Chair of the Graduate Committee. His research interests include wireless sensor networks, wireless communication, and interconnection networks. He is a member of the ACM, IEEE, and IEEE Computer Society.

    Table of Contents

    Chapter 1: Mobile Adaptive Computing Chapter 2: Mobility Management Chapter 3: Data Dissemination and Management Chapter 4: Context-Aware Computing Chapter 5: Introduction to Mobile Middleware Chapter 6: Middleware for Application Development: Adaptation and Agents Chapter 7: Service Discovery Middleware: Finding Needed Services Chapter 8: Introduction to Ad Hoc and Sensor Networks Chapter 9: Challenges Chapter 10: Protocols Chapter 11: Approaches and Solutions Chapter 12: Wireless Security Chapter 13: Approaches to Security Chapter 14: Security in Wireless Personal Area Networks Chapter 15: Security in Wireless Local Area Networks Chapter 16: Security in Wireless Metropolitan Area Networks (802.16) Chapter 17: Security in Wide Area Networks APPENDIX A: BRIEF INTRODUCTION TO WIRELESS COMMUNICATION AND NETWORKING APPENDIX B: QUESTIONS INDEX BIBLIOGRAPHY GLOSSARY REFERENCES
    From the B&N Reads Blog

    Customer Reviews