€ 68,00
Bluetooth is a technology for short range wireless communication. It can be used to connect almost any device to another device. Bluetooth-enabled devices, such as mobile phones, headsets, PCs, laptops, printers, mice, and keyboards, are widely used all over the world. Therefore, it is very important to keep Bluetooth security issues up-to-date. The aim of this book is to evaluate security threats in Bluetooth-enabled systems. The book concentrates on practical aspects of Bluetooth security: weaknesses of Bluetooth security are studied, new attacks are proposed, new Bluetooth security analysis tools are implemented, practical experiments are carried out in our research laboratory, vulnerability evaluation is performed, countermeasures against discovered attacks are proposed, a comparative analysis of the Man-In-The-Middle attacks on Bluetooth is presented, a novel system for detecting and preventing intrusions in Bluetooth networks is proposed, and a further classification of Bluetooth-enabled networks is provided. This book helps all kinds of Bluetooth users, from home users to IT enterprise experts, to make sure that the security of their Bluetooth networks is strong enough!
Book Details: |
|
ISBN-13: |
978-3-8383-1344-3 |
ISBN-10: |
3838313445 |
EAN: |
9783838313443 |
Book language: |
English |
By (author) : |
Keijo Haataja |
Number of pages: |
188 |
Published on: |
2009-11-04 |
Category: |
Informatics |