Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Bluetooth Security
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Résumé

This first-of-its-kind book, written by expert authors who actively contribute to the evolution of Bluetooth specifications, provides an overview and detailed descriptions of all the security functions and features of this standard latest core release. After categorizing all the security issues involved in ad hoc networking, this hands-on volume explains how to design a highly secure Bluetooth system and implement security enhancements. The book also helps practitioners fully understand the main security risks involved with introducing Bluetooth-based communications in their organizations.

This cutting-edge resource examines the most significant attacks on Bluetooth security mechanisms and their implementations, demonstrating how some of these known weaknesses can be avoided with appropriate defensive measures. The book presents concrete examples of how to design security solutions for some Bluetooth applications and products built on these applications. Professionals find real-world case studies including technical algorithms, mechanisms and protocols, and security architectures. These architectures offer valuable guidelines for use in building Bluetooth and non-Bluetooth-specific security mechanisms.

L'auteur - Christian Gehrmann

Christian Gehrmann is a senior specialist in security architectures and protocols for Ericsson Mobile Platforms AB. He was formerly the chairman of the Bluetooth SIG Security Expert Group. Dr. Gehrmann holds a Ph.D. in information theory and an M.Sc. in electrical engineering from Lund University.

L'auteur - Joakim Persson

Joakim Persson is a technical manager of new technology in the research department of Ericsson Mobile Platforms AB. He has been playing an active role in the Bluetooth SIG Radio Working Group for many years. Dr. Persson holds a Ph.D. in information theory and an M.Sc. in computer engineering from Lund University.

L'auteur - Ben Smeets

Ben Smeets is an Ericsson expert in security systems and data compression at Ericsson Mobile Platforms AB. He is also a full professor in digital switching theory at Lund University. Dr. Smeets holds a Decent degree and Ph.D. in digital techniques from Lund University and an M.Sc. in electrical engineering from Eindhoven University of Technology.

Sommaire

  • Bluetooth Security Basics
    • Introduction
    • Overview of the Bluetooth Security Architecture
    • Bluetooth Pairing and Key Management
    • Algorithms
    • Broadcast Encryption
    • Security Policies and Access Control
    • Attacks, Strenghs, and Weaknesses
  • Bluetooth Security Enhancements
    • Providing Anonymity
    • Key Management Extensions
    • Security for Bluetooth Applications
Voir tout
Replier

Caractéristiques techniques

  PAPIER
Éditeur(s) Artech House
Auteur(s) Christian Gehrmann, Joakim Persson, Ben Smeets
Collection Internet/Computer Security
Parution 22/11/2004
Nb. de pages 204
Format 15,5 x 23,5
Couverture Relié
Poids 436g
Intérieur Noir et Blanc
EAN13 9781580535045
ISBN13 978-1-58053-504-5

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav.client@eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription