Security in ad hoc and sensor networks / Raheem Beyah, Janise McNair, Cherita Corbett.

Saved in:
Bibliographic Details
Superior document:Series in computer and network security ; v. 3
:
TeilnehmendeR:
Year of Publication:2010
Language:English
Series:Computer and network security ; v. 3.
Online Access:
Physical Description:xii, 406 p. :; ill. (some col.).
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 01818nam a2200433 a 4500
001 5001679353
003 MiAaPQ
005 20200520144314.0
006 m o d |
007 cr cn|||||||||
008 101005s2010 si a sb 000 0 eng d
010 |z  2010484097 
020 |z 9789814271080 
020 |z 981427108X 
020 |a 9789814271097 (electronic bk.) 
035 |a (MiAaPQ)5001679353 
035 |a (Au-PeEL)EBL1679353 
035 |a (CaPaEBR)ebr10422496 
035 |a (CaONFJC)MIL275786 
035 |a (OCoLC)670429880 
040 |a MiAaPQ  |c MiAaPQ  |d MiAaPQ 
050 4 |a TK5105.59  |b .B49 2010 
100 1 |a Beyah, Raheem  |q (Raheem A.),  |d 1976- 
245 1 0 |a Security in ad hoc and sensor networks  |h [electronic resource] /  |c Raheem Beyah, Janise McNair, Cherita Corbett. 
260 |a Singapore ;  |a Hackensack, N.J. :  |b World Scientific,  |c c2010. 
300 |a xii, 406 p. :  |b ill. (some col.). 
490 1 |a Series in computer and network security ;  |v v. 3 
504 |a Includes bibliographical references. 
505 0 |a pt. 1. Authentication and confidentiality -- pt. 2. Privacy -- pt. 3. Reliability -- pt. 4. Network management and configuration. 
533 |a Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. 
650 0 |a Sensor networks  |x Security measures. 
650 0 |a Wireless communication systems  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
655 4 |a Electronic books. 
700 1 |a McNair, Janise  |q (Janise Yvette),  |d 1968- 
700 1 |a Corbett, Cherita  |q (Cherita L.) 
710 2 |a ProQuest (Firm) 
830 0 |a Computer and network security ;  |v v. 3. 
856 4 0 |u https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1679353  |z Click to View