All
All

Building Next-Generation Converged Networks: Theory and Practice

757 KB | 3 files | null DOC,null PDF

This excerpt from chapter 7 provides an overview of cellular networks, LANs, PANs, WLAN security, and best practices for mobile device security.

Supplying a comprehensive introduction to next-generation networks, Building Next-Generation Converged Networks: Theory and Practice strikes a balance between how and why things work and how to make them work. It compiles recent advancements along with basic issues from the wide range of fields related to next generation networks. 

Containing the contributions of 56 industry experts and researchers from 16 different countries, the book presents relevant theoretical frameworks and the latest research. It investigates new technologies such as IPv6 over Low Power Wireless Personal Area Network (6LoWPAN) architectures, standards, mobility, and security.

Chapter 7 focuses on an overview of wireless network security, including cellular networks, LANs, PANs, WLAN security, and best practices for mobile device security.

Excerpted with permission from the publisher, CRC Press, from "Building Next-Generation Converged Networks: Theory and Practice," edited by Al-Sakib Khan Pathan; Muhammad Mostafa Monowar; Zubair Md. Fadlullah. Copyright © 2013.

The attached zip file includes:

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • Wireless Network Security.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.
Related IT Downloads

Compliance2 Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs for the GRC program. ...  More >>

Security95 Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat information sharing relationships. ...  More >>

email9 Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.