Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
No image available for this title
Bookmark Share

Text

Wireless Security : Models, Threats, and Solutions

Randal K. Nichols - Personal Name; Panos C. Lekkas - Personal Name;

Why is Wireless Different?
Introduction
Protecting The Means Of Communication
Protecting Privacy
Promoting Safety
The Personal and the Public
Shaking Up the Status Quo
Understanding wireless Forecasts
Reasonable Degree of Security
Regulatory Environments and Issues
Security-Related Regulations
Security Related Market Factors
Guideliens for Security Measures
Celluler Networka and Bearer Technologies
First-Generation Wireless (IG)
Second-Generation Wireless (2G)
Spread Spectrum
Code Division Multiple Access (CDMA)
Time Division Multiple Access (TDMA)
Global System for Mobile Communications (GSM)
Third-Generation Wireless (3G)
Short Message Service (SMS)
Fourth-Generation Wireless (4G)
Summary
Endnotes
Telephone System Vulnerabilities
Interception/ Ease of Interception
Interruption of Service
Unintentional Interruptions
Natural Hazards
Hurricanes
Tornadoes
Winter storms
Flooding
Earthquake
Fire
Power outages
Software failures
Intentional Interruptions
Phone Phreaking
Legal Aspects
Laws in the United States
Privacy
Cyptography
Jamming
Right to Free Spech and Privacy Expectations When Using
Cell Phones
Who Is Doing The Intercepting?
Joe Q. Public
Mobile Telephones
Cellular Telephones
Friends and Neighbors; The Unintentional Intercept
Voice Systems
Data Systems
Criminal Arena
Fraud
Pagers
Drugs Cartels
Military – United States
Other Countries
ECHELON
ECHELON Ground Stations
Future Research
Law Enforcement
Applications
Cell Phone Vulnerabilities
Jamming
Interception
Countermeasures to Jamming and Interception
Code Division Multiple Access (CDMA)
Who’s Listening to Cell Phone Conversations?
Fraud
Countermeasures to Fraud
History of Cordless Telephones
Handset Features
Handset Vulnereabilities
Countermeasures
Microphones
Types of Microphones
Use of Microphones
Countermeasures
RF Data Communications
Short Range:


Availability

No copy data

Detail Information
Series Title
-
Call Number
005.8 NIC w
Publisher
: .,
Collation
-
Language
Indonesia
ISBN/ISSN
-
Classification
005.8
Content Type
-
Media Type
-
Carrier Type
-
Edition
-
Subject(s)
Computer security
Computer communication systems.
Computer networks--Security measures
Specific Detail Info
-
Statement of Responsibility
-
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?