Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 3 from your keywords: subject="Bluetooth technology ...
cover
Bluetooth end to end
Comment Share
Diane McMichael GilsterD.M. Bakker a

Bluetooth End to End is a comprehensive look at the technology from the standpoint of the IT Professional. The book goes above and beyond a simple re-hashing of the specification to provide practical implementation information on Bluetooth technology application fundamentals, implementation, wireless networking, Bluetooth security considerations, chip technology and the required specifications …

Edition
first edition
ISBN/ISSN
9780764548871
Collation
xxiii, 309 hal : ilus. ; 24 cm.
Series Title
-
Call Number
621.39 BAK b
Availability1
Add to basket
MARC DownloadCite
cover
Performance modeling and analysis of bluetooth networks
Comment Share
Misic, JelenaMisic, Vojislav B.

Until now, developers and researchers interested in the design, operation, and performance of Bluetooth networks have lacked guidance about potential answers and the relative advantages and disadvantages of performance solutions. Performance Modeling and Analysis of Bluetooth Networks: Polling, Scheduling, and Traffic Control summarizes the research on the performance of Bluetooth networks, …

Edition
-
ISBN/ISSN
9780849331572
Collation
336 hlm.; ilus.; 23 cm
Series Title
-
Call Number
004.62 MIS p
Availability2
Add to basket
MARC DownloadCite
cover
Bluetooth security attacks: comparative analysis, attacks, and countermeasures
Comment Share
Haataja, KeijoHypponen, KonstantinPasanen, SannaToivanen, Pekka

Table of contents: 1.Introduction 2.Overview of Bluetooth Security 3.Reasons for Bluetooth Network Vulnerabilities 3.1.Vulnerability to Eavesdropping 3.2.Weaknesses in Encryption Mechanisms 3.3.Weaknesses in PIN Code Selection 3.4.Weaknesses in Association Models of SSP 3.5.Weaknesses in Device Configuration 4.Comparative Analysis of Bluetooth Security Attacks 4.1.Disclosure Threats …

Edition
--
ISBN/ISSN
9783642406454
Collation
93 hal.; ilus.; 24 cm
Series Title
--
Call Number
004.6 HAA b
Availability1
Add to basket
MARC DownloadCite
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?