Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasures /
Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literatur...
Main Authors: | Haataja, Keijo. (Author), Hyppn̲en, Konstantin. (Author), Pasanen, Sanna. (Author), Toivanen, Pekka. (Author) |
---|---|
Corporate Author: | SpringerLink (Online service) |
Format: | Electronic |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2013.
|
Series: | SpringerBriefs in Computer Science,
|
Subjects: | |
Online Access: | https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-40646-1 |
Similar Items
-
Malware analysis and detection engineering : a comprehensive approach to detect and analyze modern malware /
by: Mohanta, Abhijit,, et al.
Published: (2020) -
The impact of service oriented architecture adoption on organizations /
by: Niknejad, Naghmeh,, et al.
Published: (2019) -
Cybersecurity fundamentals a real-world perspective /
by: Thakur, Kutub.
Published: (2020) -
Internet infrastructure : networking, web services, and cloud computing /
by: Fox, Richard, 1964-, et al.
Published: (2018) -
Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware /
by: Monnappa K A,
Published: (2018)