Network-Aware Security for Group Communications
ISBN-13:
9780387688466
ISBN-10:
0387688463
Edition:
2008
Author:
Wade Trappe, K. J. Ray Liu, Yan Sun
Publication date:
2007
Publisher:
Springer
Format:
Hardcover
322 pages
Category:
Computer Certification
,
Information Theory
,
Computer Science
,
Internet & Networking
,
Hardware & DIY
,
Internet, Groupware, & Telecommunications
,
Networking & Cloud Computing
,
Network Security
,
Security & Encryption
,
Algorithms
,
Programming
,
Telecommunications & Sensors
,
Engineering
FREE US shipping
Book details
ISBN-13:
9780387688466
ISBN-10:
0387688463
Edition:
2008
Author:
Wade Trappe, K. J. Ray Liu, Yan Sun
Publication date:
2007
Publisher:
Springer
Format:
Hardcover
322 pages
Category:
Computer Certification
,
Information Theory
,
Computer Science
,
Internet & Networking
,
Hardware & DIY
,
Internet, Groupware, & Telecommunications
,
Networking & Cloud Computing
,
Network Security
,
Security & Encryption
,
Algorithms
,
Programming
,
Telecommunications & Sensors
,
Engineering
Summary
Network-Aware Security for Group Communications (ISBN-13: 9780387688466 and ISBN-10: 0387688463), written by authors
Wade Trappe, K. J. Ray Liu, Yan Sun, was published by Springer in 2007.
With an overall rating of 3.7 stars, it's a notable title among other
Computer Certification
(Information Theory, Computer Science, Internet & Networking, Hardware & DIY, Internet, Groupware, & Telecommunications, Networking & Cloud Computing, Network Security, Security & Encryption, Algorithms, Programming, Telecommunications & Sensors, Engineering) books. You can easily purchase or rent Network-Aware Security for Group Communications (Hardcover) from BooksRun,
along with many other new and used
Computer Certification
books
and textbooks.
And, if you're looking to sell your copy, our current buyback offer is $0.3.
Description
This book aims to fill a growing need in the research community for a reference that describes the state-of-the-art in securing group communications. It focuses on tailoring the security solution to the underlying network architecture (such as the wireless cellular network or the ad hoc/sensor network), or to the application using the security methods (such as multimedia multicasts).
We would LOVE it if you could help us and other readers by reviewing the book
Book review
Congratulations! We have received your book review.
{user}
{createdAt}
by {truncated_author}