000 | 06161cam a2200745 i 4500 | ||
---|---|---|---|
001 | ocn823930433 | ||
003 | OCoLC | ||
005 | 20171112123922.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 130109s2013 nju ob 001 0 eng | ||
010 | _a 2013001154 | ||
020 |
_a9781118512944 _q(ePub) |
||
020 |
_a1118512944 _q(ePub) |
||
020 |
_a9781118512852 _q(MobiPocket) |
||
020 |
_a1118512855 _q(MobiPocket) |
||
020 |
_a9781118512999 _q(Adobe PDF) |
||
020 |
_a1118512995 _q(Adobe PDF) |
||
020 |
_a9781118512920 _q(electronic bk.) |
||
020 |
_a1118512928 _q(electronic bk.) |
||
020 |
_z9781118496534 _q(cloth) |
||
029 | 1 |
_aAU@ _b000052916127 |
|
029 | 1 |
_aAU@ _b000053297467 |
|
029 | 1 |
_aCHBIS _b010026675 |
|
029 | 1 |
_aCHVBK _b306238322 |
|
029 | 1 |
_aDEBSZ _b431373787 |
|
029 | 1 |
_aDKDLA _b820120-katalog:000652028 |
|
029 | 1 |
_aNZ1 _b14970288 |
|
029 | 1 |
_aNZ1 _b15351097 |
|
029 | 1 |
_aDEBBG _bBV041876502 |
|
035 |
_a(OCoLC)823930433 _z(OCoLC)869773133 _z(OCoLC)880908571 |
||
037 |
_a84DFE8D3-2119-46F3-A1EB-79001A9947F3 _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
040 |
_aDLC _beng _erda _epn _cDLC _dYDX _dEBLCP _dDG1 _dN$T _dYDXCP _dE7B _dUBY _dTEFOD _dUKDOC _dK6U _dAU@ _dCOO _dDEBSZ _dTEFOD _dOCLCQ _dDG1 |
||
042 | _apcc | ||
049 | _aMAIN | ||
050 | 0 | 0 | _aTK5103.4885 |
072 | 7 |
_aCOM _x060030 _2bisacsh |
|
072 | 7 |
_aCOM _x060080 _2bisacsh |
|
082 | 0 | 0 |
_a004.67/8 _223 |
100 | 1 | _aRhee, Man Young. | |
245 | 1 | 0 |
_aWireless mobile internet security / _cMan Young Rhee. _h[electronic resource] |
250 | _aSecond edition. | ||
264 | 1 |
_aHoboken : _bJohn Wiley & Sons Inc., _c2013. |
|
300 | _a1 online resource. | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aCover; Title Page; Copyright; Contents; Preface; About the Author; Acknowledgments; Chapter 1 Internetworking and Layered Models; 1.1 Networking Technology; 1.1.1 Local Area Networks (LANs); 1.1.2 Wide Area Networks (WANs); 1.2 Connecting Devices; 1.2.1 Switches; 1.2.2 Repeaters; 1.2.3 Bridges; 1.2.4 Routers; 1.2.5 Gateways; 1.3 The OSI Model; 1.4 TCP/IP Model; 1.4.1 Network Access Layer; 1.4.2 Internet Layer; 1.4.3 Transport Layer; 1.4.4 Application Layer; Chapter 2 TCP/IP Suite and Internet Stack Protocols; 2.1 Network Layer Protocols; 2.1.1 Internet Protocol (IP). | |
505 | 8 | _a2.1.2 Address Resolution Protocol (ARP)2.1.3 Reverse Address Resolution Protocol (RARP); 2.1.4 Classless Interdomain Routing (CIDR); 2.1.5 IP Version 6 (IPv6 or IPng); 2.1.6 Internet Control Message Protocol (ICMP); 2.1.7 Internet Group Management Protocol (IGMP); 2.2 Transport Layer Protocols; 2.2.1 Transmission Control Protocol (TCP); 2.2.2 User Datagram Protocol (UDP); 2.3 World Wide Web; 2.3.1 Hypertext Transfer Protocol (HTTP); 2.3.2 Hypertext Markup Language (HTML); 2.3.3 Common Gateway Interface (CGI); 2.3.4 Java; 2.4 File Transfer; 2.4.1 File Transfer Protocol (FTP). | |
505 | 8 | _a2.4.2 Trivial File Transfer Protocol (TFTP)2.4.3 Network File System (NFS); 2.5 E-Mail; 2.5.1 Simple Mail Transfer Protocol (SMTP); 2.5.2 Post Office Protocol Version 3 (POP3); 2.5.3 Internet Message Access Protocol (IMAP); 2.5.4 Multipurpose Internet Mail Extension (MIME); 2.6 Network Management Service; 2.6.1 Simple Network Management Protocol (SNMP); 2.7 Converting IP Addresses; 2.7.1 Domain Name System (DNS); 2.8 Routing Protocols; 2.8.1 Routing Information Protocol (RIP); 2.8.2 Open Shortest Path First (OSPF); 2.8.3 Border Gateway Protocol (BGP); 2.9 Remote System Programs; 2.9.1 TELNET. | |
505 | 8 | _a2.9.2 Remote Login (Rlogin)2.10 Social Networking Services; 2.10.1 Facebook; 2.10.2 Twitter; 2.10.3 Linkedin; 2.10.4 Groupon; 2.11 Smart IT Devices; 2.11.1 Smartphones; 2.11.2 Smart TV; 2.11.3 Video Game Console; 2.12 Network Security Threats; 2.12.1 Worm; 2.12.2 Virus; 2.12.3 DDoS; 2.13 Internet Security Threats; 2.13.1 Phishing; 2.13.2 SNS Security Threats; 2.14 Computer Security Threats; 2.14.1 Exploit; 2.14.2 Password Cracking; 2.14.3 Rootkit; 2.14.4 Trojan Horse; 2.14.5 Keylogging; 2.14.6 Spoofing Attack; 2.14.7 Packet Sniffer; 2.14.8 Session Hijacking. | |
505 | 8 | _aChapter 3 Global Trend of Mobile Wireless Technology3.1 1G Cellular Technology; 3.1.1 AMPS (Advanced Mobile Phone System); 3.1.2 NMT (Nordic Mobile Telephone); 3.1.3 TACS (Total Access Communications System); 3.2 2G Mobile Radio Technology; 3.2.1 CDPD (Cellular Digital Packet Data), North American Protocol; 3.2.2 GSM (Global System for Mobile Communications); 3.2.3 TDMA-136 or IS-54; 3.2.4 iDEN (Integrated Digital Enhanced Network); 3.2.5 cdmaOne IS-95A; 3.2.6 PDC (Personal Digital Cellular); 3.2.7 i-mode; 3.2.8 WAP (Wireless Application Protocol); 3.3 2.5G Mobile Radio Technology. | |
505 | 8 | _a3.3.1 ECSD (Enhanced Circuit-Switched Data). | |
520 | _aThe mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies through multiple enhancements of both cellular mobile systems and Internet interoperability. Flawless integration between these two wired/wireless networks will enable subscribers to not only roam worldwide, but also to solve the e. | ||
588 | 0 | _aPrint version record and CIP data provided by publisher. | |
650 | 0 |
_aWireless Internet _xSecurity measures. |
|
650 | 4 |
_aWireless Internet _xSecurity measures. |
|
650 | 7 |
_aCOMPUTERS _xNetworking _xIntranets & Extranets. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xWeb _xGeneral. _2bisacsh |
|
655 | 4 | _aElectronic books. | |
776 | 0 | 8 |
_iPrint version: _aRhee, Man Young. _tWireless mobile internet security. _bSecond edition. _dHoboken : John Wiley & Sons Inc., 2013 _z9781118496534 _w(DLC) 2012040165 |
856 | 4 | 0 |
_uhttp://onlinelibrary.wiley.com/book/10.1002/9781118512920 _zWiley Online Library |
942 |
_2ddc _cBK |
||
999 |
_c206346 _d206346 |