Security in ad hoc and sensor networks / Raheem Beyah, Janise McNair, Cherita Corbett.
Saved in:
Superior document: | Series in computer and network security ; v. 3 |
---|---|
: | |
TeilnehmendeR: | |
Year of Publication: | 2010 |
Language: | English |
Series: | Computer and network security ;
v. 3. |
Online Access: | |
Physical Description: | xii, 406 p. :; ill. (some col.). |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
5001679353 |
---|---|
ctrlnum |
(MiAaPQ)5001679353 (Au-PeEL)EBL1679353 (CaPaEBR)ebr10422496 (CaONFJC)MIL275786 (OCoLC)670429880 |
collection |
bib_alma |
record_format |
marc |
spelling |
Beyah, Raheem (Raheem A.), 1976- Security in ad hoc and sensor networks [electronic resource] / Raheem Beyah, Janise McNair, Cherita Corbett. Singapore ; Hackensack, N.J. : World Scientific, c2010. xii, 406 p. : ill. (some col.). Series in computer and network security ; v. 3 Includes bibliographical references. pt. 1. Authentication and confidentiality -- pt. 2. Privacy -- pt. 3. Reliability -- pt. 4. Network management and configuration. Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. Sensor networks Security measures. Wireless communication systems Security measures. Computer networks Security measures. Electronic books. McNair, Janise (Janise Yvette), 1968- Corbett, Cherita (Cherita L.) ProQuest (Firm) Computer and network security ; v. 3. https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1679353 Click to View |
language |
English |
format |
Electronic eBook |
author |
Beyah, Raheem 1976- |
spellingShingle |
Beyah, Raheem 1976- Security in ad hoc and sensor networks Series in computer and network security ; pt. 1. Authentication and confidentiality -- pt. 2. Privacy -- pt. 3. Reliability -- pt. 4. Network management and configuration. |
author_facet |
Beyah, Raheem 1976- McNair, Janise 1968- Corbett, Cherita ProQuest (Firm) ProQuest (Firm) |
author_variant |
r b rb |
author_fuller |
(Raheem A.), |
author2 |
McNair, Janise 1968- Corbett, Cherita ProQuest (Firm) |
author2_variant |
j m jm c c cc |
author2_fuller |
(Janise Yvette), (Cherita L.) |
author2_role |
TeilnehmendeR TeilnehmendeR TeilnehmendeR |
author_corporate |
ProQuest (Firm) |
author_sort |
Beyah, Raheem 1976- |
title |
Security in ad hoc and sensor networks |
title_full |
Security in ad hoc and sensor networks [electronic resource] / Raheem Beyah, Janise McNair, Cherita Corbett. |
title_fullStr |
Security in ad hoc and sensor networks [electronic resource] / Raheem Beyah, Janise McNair, Cherita Corbett. |
title_full_unstemmed |
Security in ad hoc and sensor networks [electronic resource] / Raheem Beyah, Janise McNair, Cherita Corbett. |
title_auth |
Security in ad hoc and sensor networks |
title_new |
Security in ad hoc and sensor networks |
title_sort |
security in ad hoc and sensor networks |
series |
Series in computer and network security ; |
series2 |
Series in computer and network security ; |
publisher |
World Scientific, |
publishDate |
2010 |
physical |
xii, 406 p. : ill. (some col.). |
contents |
pt. 1. Authentication and confidentiality -- pt. 2. Privacy -- pt. 3. Reliability -- pt. 4. Network management and configuration. |
isbn |
9789814271097 (electronic bk.) |
callnumber-first |
T - Technology |
callnumber-subject |
TK - Electrical and Nuclear Engineering |
callnumber-label |
TK5105 |
callnumber-sort |
TK 45105.59 B49 42010 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1679353 |
illustrated |
Illustrated |
oclc_num |
670429880 |
work_keys_str_mv |
AT beyahraheem securityinadhocandsensornetworks AT mcnairjanise securityinadhocandsensornetworks AT corbettcherita securityinadhocandsensornetworks AT proquestfirm securityinadhocandsensornetworks |
status_str |
n |
ids_txt_mv |
(MiAaPQ)5001679353 (Au-PeEL)EBL1679353 (CaPaEBR)ebr10422496 (CaONFJC)MIL275786 (OCoLC)670429880 |
hierarchy_parent_title |
Series in computer and network security ; v. 3 |
hierarchy_sequence |
v. 3. |
is_hierarchy_title |
Security in ad hoc and sensor networks |
container_title |
Series in computer and network security ; v. 3 |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField |
_version_ |
1792330777307906048 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01818nam a2200433 a 4500</leader><controlfield tag="001">5001679353</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">101005s2010 si a sb 000 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2010484097</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9789814271080</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">981427108X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789814271097 (electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5001679353</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL1679353</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10422496</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL275786</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)670429880</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.B49 2010</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Beyah, Raheem</subfield><subfield code="q">(Raheem A.),</subfield><subfield code="d">1976-</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security in ad hoc and sensor networks</subfield><subfield code="h">[electronic resource] /</subfield><subfield code="c">Raheem Beyah, Janise McNair, Cherita Corbett.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Singapore ;</subfield><subfield code="a">Hackensack, N.J. :</subfield><subfield code="b">World Scientific,</subfield><subfield code="c">c2010.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xii, 406 p. :</subfield><subfield code="b">ill. (some col.).</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Series in computer and network security ;</subfield><subfield code="v">v. 3</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">pt. 1. Authentication and confidentiality -- pt. 2. Privacy -- pt. 3. Reliability -- pt. 4. Network management and configuration.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Sensor networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">McNair, Janise</subfield><subfield code="q">(Janise Yvette),</subfield><subfield code="d">1968-</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Corbett, Cherita</subfield><subfield code="q">(Cherita L.)</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Computer and network security ;</subfield><subfield code="v">v. 3.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1679353</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |