Providing a comprehensive introduction to next-generation networks, this book strikes a balance b...
This book provides broad coverage of wireless security issues including cryptographic coprocessor...
Wireless sensor networks (WSNs) utilize fast, cheap, and effective applications to imitate the hu...
The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues ...
Able to propagate quickly and change their payload with each infection, polymorphic worms have be...
Simulation is a widely used mechanism for validating the theoretical model of networking or commu...
Providing a comprehensive introduction to next-generation networks, this book strikes a balance b...
Wireless sensor networks (WSNs) utilize fast, cheap, and effective applications to imitate the hu...
Cryptography, the science of encoding and decoding information, allows people to do online bankin...
Think about someone taking control of your car while you're driving. Or, someone hacking into a d...
This book fills a gap in the existing literature by combining a plethora of WSN-based emerging te...
This book describes the detailed concepts of mobile security. The first two chapters provide a de...