000 -LEADER |
fixed length control field |
02896nam a22004935i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20140310151129.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
131028s2013 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783642406461 |
|
978-3-642-40646-1 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.D35 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.74 |
Edition number |
23 |
264 #1 - |
-- |
Berlin, Heidelberg : |
-- |
Springer Berlin Heidelberg : |
-- |
Imprint: Springer, |
-- |
2013. |
912 ## - |
-- |
ZDB-2-SCS |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Haataja, Keijo. |
Relator term |
author. |
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Title |
Bluetooth Security Attacks |
Medium |
[electronic resource] : |
Remainder of title |
Comparative Analysis, Attacks, and Countermeasures / |
Statement of responsibility, etc |
by Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
VII, 93 p. 31 illus. |
Other physical details |
online resource. |
440 1# - SERIES STATEMENT/ADDED ENTRY--TITLE |
Title |
SpringerBriefs in Computer Science, |
International Standard Serial Number |
2191-5768 |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chap. 1 - Introduction -- Chap. 2 - Overview of Bluetooth Security -- Chap. 3 - Bluetooth Network Vulnerabilities -- Chap. 4 - Comparative Analysis of Bluetooth Security Attacks -- Chap. 5 - Meet-in-the-Middle (MITM) Attacks on Bluetooth -- Chap. 6 - Countermeasures -- Chap. 7 - New Practical Attack -- Chap. 8 - Conclusion and Future Work References. |
520 ## - SUMMARY, ETC. |
Summary, etc |
Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions. The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer science. |
|
Topical term or geographic name as entry element |
Computer Communication Networks. |
|
Topical term or geographic name as entry element |
Data protection. |
|
Topical term or geographic name as entry element |
Data structures (Computer science). |
|
Topical term or geographic name as entry element |
Computer Science. |
|
Topical term or geographic name as entry element |
Data Structures, Cryptology and Information Theory. |
|
Topical term or geographic name as entry element |
Systems and Data Security. |
|
Topical term or geographic name as entry element |
Computer Communication Networks. |
|
Topical term or geographic name as entry element |
Security Science and Technology. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Hyppönen, Konstantin. |
Relator term |
author. |
|
Personal name |
Pasanen, Sanna. |
Relator term |
author. |
|
Personal name |
Toivanen, Pekka. |
Relator term |
author. |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9783642406454 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
http://dx.doi.org/10.1007/978-3-642-40646-1 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
E-Book |