skip to content
Security in ad hoc and sensor networks Preview this item
ClosePreview this item
Checking...

Security in ad hoc and sensor networks

Author: Raheem Beyah; Janise McNair; Cherita Corbett
Publisher: Singapore ; Hackensack, NJ : World Scientific, ©2010.
Series: Computer and network security, v. 3.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
Security issues in ad hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues addressed include (but are not limited to) attacks, malicious node detection, access control, authentication, intrusion detection, privacy and  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Beyah, Raheem (Raheem A.), 1976-
Security in ad hoc and sensor networks.
Singapore ; Hackensack, NJ : World Scientific, ©2010
(OCoLC)456137797
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Raheem Beyah; Janise McNair; Cherita Corbett
ISBN: 9789814271097 9814271098
OCLC Number: 670429880
Description: 1 online resource (xii, 406 pages) : illustrations.
Contents: pt. 1. Authentication and confidentiality --
pt. 2. Privacy --
pt. 3. Reliability --
pt. 4. Network management and configuration.
Series Title: Computer and network security, v. 3.
Responsibility: Raheem Beyah, Janise McNair, Cherita Corbett.

Abstract:

Security issues in ad-hoc and sensor networks have become extremely important. This book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/670429880> # Security in ad hoc and sensor networks
    a schema:CreativeWork, schema:MediaObject, schema:Book ;
    library:oclcnum "670429880" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/si> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/498753886#Place/hackensack_nj> ; # Hackensack, NJ
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/498753886#Place/singapore> ; # Singapore
    schema:about <http://experiment.worldcat.org/entity/work/data/498753886#Topic/technology_&_engineering_electrical> ; # TECHNOLOGY & ENGINEERING--Electrical
    schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/498753886#Topic/sensor_networks_security_measures> ; # Sensor networks--Security measures
    schema:about <http://id.loc.gov/authorities/subjects/sh2010118631> ; # Wireless communication systems--Security measures
    schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
    schema:about <http://dewey.info/class/621.38/e22/> ;
    schema:about <http://id.worldcat.org/fast/1176222> ; # Wireless communication systems--Security measures
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/106856522> ; # Cherita L. Corbett
    schema:contributor <http://viaf.org/viaf/267788341> ; # Janise Yvette McNair
    schema:copyrightYear "2010" ;
    schema:creator <http://viaf.org/viaf/106856505> ; # Raheem A. Beyah
    schema:datePublished "2010" ;
    schema:description "Security issues in ad hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues addressed include (but are not limited to) attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, key management, location verification, security architectures and protocols, secrecy and integrity, network resilience and survivability, and trust models. This complete book provides an excellent reference for students, researchers, and industry practitioners related to these areas."@en ;
    schema:description "pt. 1. Authentication and confidentiality -- pt. 2. Privacy -- pt. 3. Reliability -- pt. 4. Network management and configuration."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/498753886> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/498753886#Series/computer_and_network_security> ; # Computer and network security ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/498753886#Series/series_in_computer_and_network_security> ; # Series in computer and network security ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/456137797> ;
    schema:name "Security in ad hoc and sensor networks"@en ;
    schema:productID "670429880" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/670429880#PublicationEvent/singapore_hackensack_nj_world_scientific_2010> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/498753886#Agent/world_scientific> ; # World Scientific
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=340572> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=1679353> ;
    schema:url <http://ebooks.worldscinet.com/ISBN/9789814271097/9789814271097.html> ;
    schema:url <http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=1679353> ;
    schema:url <http://ebookcentral.proquest.com/lib/columbia/detail.action?docID=1679353> ;
    schema:url <http://ebookcentral.proquest.com/lib/warw/detail.action?docID=1679353> ;
    schema:url <http://site.ebrary.com/id/10422496> ;
    schema:workExample <http://worldcat.org/isbn/9789814271097> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/670429880> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/498753886#Agent/world_scientific> # World Scientific
    a bgn:Agent ;
    schema:name "World Scientific" ;
    .

<http://experiment.worldcat.org/entity/work/data/498753886#Place/hackensack_nj> # Hackensack, NJ
    a schema:Place ;
    schema:name "Hackensack, NJ" ;
    .

<http://experiment.worldcat.org/entity/work/data/498753886#Series/computer_and_network_security> # Computer and network security ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/670429880> ; # Security in ad hoc and sensor networks
    schema:name "Computer and network security ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/498753886#Series/series_in_computer_and_network_security> # Series in computer and network security ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/670429880> ; # Security in ad hoc and sensor networks
    schema:name "Series in computer and network security ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/498753886#Topic/technology_&_engineering_electrical> # TECHNOLOGY & ENGINEERING--Electrical
    a schema:Intangible ;
    schema:name "TECHNOLOGY & ENGINEERING--Electrical"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh2010118631> # Wireless communication systems--Security measures
    a schema:Intangible ;
    schema:name "Wireless communication systems--Security measures"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/1176222> # Wireless communication systems--Security measures
    a schema:Intangible ;
    schema:hasPart <http://id.loc.gov/authorities/subjects/sh2010118631> ; # Wireless communication systems--Security measures
    schema:name "Wireless communication systems--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
    schema:hasPart <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
    schema:name "Computer networks--Security measures"@en ;
    .

<http://viaf.org/viaf/106856505> # Raheem A. Beyah
    a schema:Person ;
    schema:birthDate "1976" ;
    schema:familyName "Beyah" ;
    schema:givenName "Raheem A." ;
    schema:givenName "Raheem" ;
    schema:name "Raheem A. Beyah" ;
    .

<http://viaf.org/viaf/106856522> # Cherita L. Corbett
    a schema:Person ;
    schema:familyName "Corbett" ;
    schema:givenName "Cherita L." ;
    schema:givenName "Cherita" ;
    schema:name "Cherita L. Corbett" ;
    .

<http://viaf.org/viaf/267788341> # Janise Yvette McNair
    a schema:Person ;
    schema:birthDate "1968" ;
    schema:familyName "McNair" ;
    schema:givenName "Janise Yvette" ;
    schema:givenName "Janise" ;
    schema:name "Janise Yvette McNair" ;
    .

<http://worldcat.org/isbn/9789814271097>
    a schema:ProductModel ;
    schema:isbn "9814271098" ;
    schema:isbn "9789814271097" ;
    .

<http://www.worldcat.org/oclc/456137797>
    a schema:CreativeWork ;
    rdfs:label "Security in ad hoc and sensor networks." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/670429880> ; # Security in ad hoc and sensor networks
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.