Results 1 to 2 of 2

Thread: Bluetooth Security

  1. #1
    Jedi Global Moderator akira's Avatar
    Join Date
    Nov 2006
    Posts
    538


    Bluetooth Security

    <div align="center"></div>

    <div align="center">Author(s): Christian Gehrmann, Joakim Persson, Ben Smeets | "Bluetooth Security"
    Artech House | Jun 2004 | ISBN: 1580535046 | English | PDF | 221 pages | 0.7 MB</div>

    This first-of-its-kind book, from expert authors actively contributing to the evolution of Bluetooth specifications, provides an overview and detailed descriptions of all the security functions and features of this standard’s latest core release. After categorizing all the security issues involved in ad hoc networking, this hands-on volume shows you how to design a highly secure Bluetooth system and implement security enhancements. The book also helps you fully understand the main security risks involved with introducing Bluetooth-based communications in your organization.

    This cutting-edge resource examines all known attacks on Bluetooth security mechanisms and their implementations, demonstrating how some of these known weaknesses can be avoided with appropriate defensive measures. The book presents concrete examples of how to design security solutions for some Bluetooth applications and products built on these applications. You find real-world case studies including technical algorithms, mechanisms and protocols, and security architectures. These architectures offer valuable guidelines for use in building Bluetooth and non-Bluetooth-specific security mechanisms.


    TABLE OF CONTENT:
    Chapter 01 - Introduction
    Chapter 02 - Overview Of The Bluetooth Security Architecture
    Chapter 03 - Bluetooth Pairing And Key Management
    Chapter 04 - Algorithms
    Chapter 05 - Broadcast Encryption
    Chapter 06 - Security Policies and Access Controls
    Chapter 07 - Attacks, Strengths And Weaknesses
    Chapter 08 - Providing Anonymity
    Chapter 09 - Key Management Extensions
    Chapter 10 - Security For Bluetooth Application

    **Hidden Content: To see this hidden content your post count must be 10 or greater.**


    MIRROR : IceFile.com
    **Hidden Content: To see this hidden content your post count must be 10 or greater.**


    password:
    **Hidden Content: To see this hidden content your post count must be 10 or greater.**


    *******
    " I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive. We've created life in our own image."

    —Stephen Hawking




  2. #2
    supernay26
    Guest


    น่าสนใจคับ ขอบคุณมากคับ

Similar Threads

  1. Bluetooth คืออะไร ??
    By —DarkForce— in forum บทความ คอมพิวเตอร์ ทัวไป
    Replies: 0
    Last Post: 04-12-2009, 10:08 PM
  2. New Bluetooth Handsfree in you Car
    By hip2008 in forum iPhone, iPod, PDA, Palm, มือถือ, คอมพิวเตอร์พกพา
    Replies: 0
    Last Post: 10-09-2009, 03:46 PM
  3. [ENG] Bluetooth Demystified
    By pingzonline in forum E-Book, Video หรือบทความทั่วไปด้าน Computer
    Replies: 0
    Last Post: 22-09-2007, 05:43 PM
  4. Bluetooth
    By Anonymous in forum Symbian C++, J2ME, Brew,XHTML
    Replies: 0
    Last Post: 08-09-2006, 10:07 AM
  5. somebody help? I can not use my bluetooth place.
    By gasus in forum Symbian C++, J2ME, Brew,XHTML
    Replies: 1
    Last Post: 25-08-2004, 07:29 PM

Members who have read this thread : 0

Actions : (View-Readers)

There are no names to display.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •