Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasures /
Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literatur...
Κύριοι συγγραφείς: | , , , |
---|---|
Συγγραφή απο Οργανισμό/Αρχή: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2013.
|
Σειρά: | SpringerBriefs in Computer Science,
|
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Chap. 1 - Introduction
- Chap. 2 - Overview of Bluetooth Security
- Chap. 3 - Bluetooth Network Vulnerabilities
- Chap. 4 - Comparative Analysis of Bluetooth Security Attacks
- Chap. 5 - Meet-in-the-Middle (MITM) Attacks on Bluetooth
- Chap. 6 - Countermeasures
- Chap. 7 - New Practical Attack
- Chap. 8 - Conclusion and Future Work References.