Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasures /

Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literatur...

Full description

Bibliographic Details
Main Authors: Haataja, Keijo. (Author), Hyppn̲en, Konstantin. (Author), Pasanen, Sanna. (Author), Toivanen, Pekka. (Author)
Corporate Author: SpringerLink (Online service)
Format: Electronic
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013.
Series:SpringerBriefs in Computer Science,
Subjects:
Online Access:https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-40646-1