| The Handbook of Ad Hoc Wireless Networks | | Contribution by:
| Seet, Boon-Chong Hannan, Xiao Tseng, Yu-Chee Mishra, Amitabn Giordano, Silvia Suh, Young-Joo Sohraby, Kazem Yazbeck, Sal Shu, Yantai Papadimitratos, Panagiotis Aggelou, George Rezende, Jose Ferreira d Sadiku, Matthew N. O. Biglieri, Ezio Wu, Jie Li, Bo Haas, Zygmunt J. Chaing, Chua Kee Winston, Seah Khoon Guan Lorenz, Pascal Sheu, Jang-Ping Youn, Hee Yong Stojmenovic, Ivan Widmer, Joerg Hartenstein, Hannes Mauve, Martin Mouftah, Hussein T. Safwat, Ahmed Hassanein, Hossam S. Yang, Oliver Kumar, Anurag Lin, Ting-Yu Baldoni, Roberto Conti, Marco Fonseca, Nelson Yu, Chansu Zhou, Dan Wang, Kuochen Chang, Chaou-Tang Chen, Xiao Lee, Ben Lima, Michele Chakrabarti, Satyabrata Beraldi, Roberto Liu, Jiang Chuan Zhang, Qian Zhu, Wenwu Moh, Sangman Wang, Lei Hung, Pei-Kai Hsu, Chih-Shun Kim, Won-Ik Kwon, Dong-Hee Nadkarni, Ketan M. Pearlman, Marc R. Samar, Prince Karnik, Aditya Fubler, Holger Lee, Bu-Sung Lau, Chiew-Tong Hu, Cheng-Ta Chao, Chih-Min | Editor:
| Ilyas, Mohammad | Series edited by:
| Dorf, Richard C. | Series title: | The Electrical Engineering Handbook Ser. | ISBN: | 978-0-8493-1332-5 | Publication Date: | Dec 2002 | Publisher: | CRC Press LLC
| Book Format: | Hardback | List Price: | AUD $395.00 | Book Description:
|
A one-stop source of information for the rapidly growing field of ad hoc wireless networks, this book offers authoritative information on a broad range of topics, from the basic to the research level. It addresses potential uses of ad hoc wireless networks, such as disaster recovery and applications related to healthcare, defense, home networking, the classroom, and corporate conferencing. The book then goes on to cover security and privacy of information in ad hoc wireless networks,... More DescriptionA one-stop source of information for the rapidly growing field of ad hoc wireless networks, this book offers authoritative information on a broad range of topics, from the basic to the research level. It addresses potential uses of ad hoc wireless networks, such as disaster recovery and applications related to healthcare, defense, home networking, the classroom, and corporate conferencing. The book then goes on to cover security and privacy of information in ad hoc wireless networks, including potential security threats, encryption techniques, and methods to deter unauthorized access. It provides a complete reference to the technological and implementation challenges readers will encounter in practice. | |