|
|
|
|
LEADER |
06134nam a2200745 4500 |
001 |
ocn823930433 |
003 |
OCoLC |
005 |
20170124071533.8 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
130109s2013 nju ob 001 0 eng |
010 |
|
|
|a 2013001154
|
040 |
|
|
|a DLC
|b eng
|e rda
|e pn
|c DLC
|d YDX
|d EBLCP
|d DG1
|d N$T
|d YDXCP
|d E7B
|d UBY
|d TEFOD
|d UKDOC
|d K6U
|d AU@
|d COO
|d DEBSZ
|d TEFOD
|d OCLCQ
|d DG1
|d GrThAP
|
019 |
|
|
|a 869773133
|a 880908571
|
020 |
|
|
|a 9781118512944
|q (ePub)
|
020 |
|
|
|a 1118512944
|q (ePub)
|
020 |
|
|
|a 9781118512852
|q (MobiPocket)
|
020 |
|
|
|a 1118512855
|q (MobiPocket)
|
020 |
|
|
|a 9781118512999
|q (Adobe PDF)
|
020 |
|
|
|a 1118512995
|q (Adobe PDF)
|
020 |
|
|
|a 9781118512920
|q (electronic bk.)
|
020 |
|
|
|a 1118512928
|q (electronic bk.)
|
020 |
|
|
|z 9781118496534
|q (cloth)
|
029 |
1 |
|
|a AU@
|b 000052916127
|
029 |
1 |
|
|a AU@
|b 000053297467
|
029 |
1 |
|
|a CHBIS
|b 010026675
|
029 |
1 |
|
|a CHVBK
|b 306238322
|
029 |
1 |
|
|a DEBSZ
|b 431373787
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:000652028
|
029 |
1 |
|
|a NZ1
|b 14970288
|
029 |
1 |
|
|a NZ1
|b 15351097
|
029 |
1 |
|
|a DEBBG
|b BV041876502
|
035 |
|
|
|a (OCoLC)823930433
|z (OCoLC)869773133
|z (OCoLC)880908571
|
037 |
|
|
|a 84DFE8D3-2119-46F3-A1EB-79001A9947F3
|b OverDrive, Inc.
|n http://www.overdrive.com
|
042 |
|
|
|a pcc
|
050 |
0 |
0 |
|a TK5103.4885
|
072 |
|
7 |
|a COM
|x 060030
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 060080
|2 bisacsh
|
082 |
0 |
0 |
|a 004.67/8
|2 23
|
049 |
|
|
|a MAIN
|
100 |
1 |
|
|a Rhee, Man Young.
|
245 |
1 |
0 |
|a Wireless mobile internet security /
|c Man Young Rhee.
|
250 |
|
|
|a Second edition.
|
264 |
|
1 |
|a Hoboken :
|b John Wiley & Sons Inc.,
|c 2013.
|
300 |
|
|
|a 1 online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record and CIP data provided by publisher.
|
505 |
0 |
|
|a Cover; Title Page; Copyright; Contents; Preface; About the Author; Acknowledgments; Chapter 1 Internetworking and Layered Models; 1.1 Networking Technology; 1.1.1 Local Area Networks (LANs); 1.1.2 Wide Area Networks (WANs); 1.2 Connecting Devices; 1.2.1 Switches; 1.2.2 Repeaters; 1.2.3 Bridges; 1.2.4 Routers; 1.2.5 Gateways; 1.3 The OSI Model; 1.4 TCP/IP Model; 1.4.1 Network Access Layer; 1.4.2 Internet Layer; 1.4.3 Transport Layer; 1.4.4 Application Layer; Chapter 2 TCP/IP Suite and Internet Stack Protocols; 2.1 Network Layer Protocols; 2.1.1 Internet Protocol (IP).
|
505 |
8 |
|
|a 2.1.2 Address Resolution Protocol (ARP)2.1.3 Reverse Address Resolution Protocol (RARP); 2.1.4 Classless Interdomain Routing (CIDR); 2.1.5 IP Version 6 (IPv6 or IPng); 2.1.6 Internet Control Message Protocol (ICMP); 2.1.7 Internet Group Management Protocol (IGMP); 2.2 Transport Layer Protocols; 2.2.1 Transmission Control Protocol (TCP); 2.2.2 User Datagram Protocol (UDP); 2.3 World Wide Web; 2.3.1 Hypertext Transfer Protocol (HTTP); 2.3.2 Hypertext Markup Language (HTML); 2.3.3 Common Gateway Interface (CGI); 2.3.4 Java; 2.4 File Transfer; 2.4.1 File Transfer Protocol (FTP).
|
505 |
8 |
|
|a 2.4.2 Trivial File Transfer Protocol (TFTP)2.4.3 Network File System (NFS); 2.5 E-Mail; 2.5.1 Simple Mail Transfer Protocol (SMTP); 2.5.2 Post Office Protocol Version 3 (POP3); 2.5.3 Internet Message Access Protocol (IMAP); 2.5.4 Multipurpose Internet Mail Extension (MIME); 2.6 Network Management Service; 2.6.1 Simple Network Management Protocol (SNMP); 2.7 Converting IP Addresses; 2.7.1 Domain Name System (DNS); 2.8 Routing Protocols; 2.8.1 Routing Information Protocol (RIP); 2.8.2 Open Shortest Path First (OSPF); 2.8.3 Border Gateway Protocol (BGP); 2.9 Remote System Programs; 2.9.1 TELNET.
|
505 |
8 |
|
|a 2.9.2 Remote Login (Rlogin)2.10 Social Networking Services; 2.10.1 Facebook; 2.10.2 Twitter; 2.10.3 Linkedin; 2.10.4 Groupon; 2.11 Smart IT Devices; 2.11.1 Smartphones; 2.11.2 Smart TV; 2.11.3 Video Game Console; 2.12 Network Security Threats; 2.12.1 Worm; 2.12.2 Virus; 2.12.3 DDoS; 2.13 Internet Security Threats; 2.13.1 Phishing; 2.13.2 SNS Security Threats; 2.14 Computer Security Threats; 2.14.1 Exploit; 2.14.2 Password Cracking; 2.14.3 Rootkit; 2.14.4 Trojan Horse; 2.14.5 Keylogging; 2.14.6 Spoofing Attack; 2.14.7 Packet Sniffer; 2.14.8 Session Hijacking.
|
505 |
8 |
|
|a Chapter 3 Global Trend of Mobile Wireless Technology3.1 1G Cellular Technology; 3.1.1 AMPS (Advanced Mobile Phone System); 3.1.2 NMT (Nordic Mobile Telephone); 3.1.3 TACS (Total Access Communications System); 3.2 2G Mobile Radio Technology; 3.2.1 CDPD (Cellular Digital Packet Data), North American Protocol; 3.2.2 GSM (Global System for Mobile Communications); 3.2.3 TDMA-136 or IS-54; 3.2.4 iDEN (Integrated Digital Enhanced Network); 3.2.5 cdmaOne IS-95A; 3.2.6 PDC (Personal Digital Cellular); 3.2.7 i-mode; 3.2.8 WAP (Wireless Application Protocol); 3.3 2.5G Mobile Radio Technology.
|
505 |
8 |
|
|a 3.3.1 ECSD (Enhanced Circuit-Switched Data).
|
520 |
|
|
|a The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies through multiple enhancements of both cellular mobile systems and Internet interoperability. Flawless integration between these two wired/wireless networks will enable subscribers to not only roam worldwide, but also to solve the e.
|
650 |
|
0 |
|a Wireless Internet
|x Security measures.
|
650 |
|
4 |
|a Wireless Internet
|x Security measures.
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Intranets & Extranets.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Web
|x General.
|2 bisacsh
|
655 |
|
4 |
|a Electronic books.
|
776 |
0 |
8 |
|i Print version:
|a Rhee, Man Young.
|t Wireless mobile internet security.
|b Second edition.
|d Hoboken : John Wiley & Sons Inc., 2013
|z 9781118496534
|w (DLC) 2012040165
|
856 |
4 |
0 |
|u https://doi.org/10.1002/9781118512920
|z Full Text via HEAL-Link
|
994 |
|
|
|a 92
|b DG1
|