• Shop by category
  • Powered by eBay
  • Security for Ubiquitous Computing by Frank Stajano (English) Hardcover Book

    • Item No : 135643944958
    • Condition : Brand New
    • Brand : No brand Info
    • Seller : the_nile
    • Current Bid : US $121.28
    • * Item Description

    • The Nile on eBay
       

      Security for Ubiquitous Computing

      by Frank Stajano

      Ubiquitous computing is about distributed systems with a difference. It is about hundreds and thousands of computers embedded in everyday devices (such as phones, washing machines, TVs, heating sytems, smartcards, etc) communicating with each other over ad--hoc wireless networks.

      FORMAT
      Hardcover
      LANGUAGE
      English
      CONDITION
      Brand New


      Publisher Description

      * Ubiquitous computing refers to computers embedded in everyday devices communicating with each other over ad-hoc wireless networks
      * Focuses on two very hot topics: ad-hoc wireless networking and security
      * Covers security issues for well-established and widely used technologies such as GSM, Bluetooth, and IP
      * Presents a framework to make sense of the many and varied issues at stake, a taxonomy of the major problems and in-depth discussion of some specific, cutting-edge solutions
      * Includes a primer on security and the basics of cryptography
      * Describes the security issues in "peer-to-peer networking," a new technology that is gaining prominence in the media with applications such as Napster and ICQ Chat

      Back Cover

      Ubiquitous computing (ubicomp) is about networked microprocessors embedded in everyday objects: not just cellphones and home appliances but also books, bookshelves, bus stops and bathtubs. This future is closer than you might imagine. The insecurity of networked PCs is notorious. If we deployed ubicomp systems as vulnerable as PCs, the risks for society would be catastrophic. How can we do better, and what are the new problems? In a very accessible style, this book provides a coherent framework to make sense of the many issues at stake. Features include:

      • An introduction to the state of the art in ubicomp research.
      • A readable primer on security and cryptology.
      • An up-to-date technical treatment of ubicomp security, including a sceptical look at Bluetooth and 802.11.
      • "Peer-to-peer" and ad-hoc networking.
      • An in-depth discussion of specific, cutting-edge solutions.
      • An extensively annotated bibliography.
      Security for Ubiquitous Computing combines clarity, brevity and authority. It will appeal to developers and researchers in ubiquitous computing, wireless and ad-hoc networking, wearable computing and related areas. Because it is readable and self-contained, it will also prove valuable to managers, analysts, technology watchers and end users who want to understand the new opportunities and risks of ubicomp.

      Flap

      Ubiquitous computing (ubicomp) is about networked microprocessors embedded in everyday objects: not just cellphones and home appliances but also books, bookshelves, bus stops and bathtubs. This future is closer than you might imagine. The insecurity of networked PCs is notorious. If we deployed ubicomp systems as vulnerable as PCs, the risks for society would be catastrophic. How can we do better, and what are the new problems? In a very accessible style, this book provides a coherent framework to make sense of the many issues at stake. Features include: * An introduction to the state of the art in ubicomp research. * A readable primer on security and cryptology. * An up-to-date technical treatment of ubicomp security, including a sceptical look at Bluetooth and 802.11. * "Peer-to-peer" and ad-hoc networking. * An in-depth discussion of specific, cutting-edge solutions. * An extensively annotated bibliography. Security for Ubiquitous Computing combines clarity, brevity and authority. It will appeal to developers and researchers in ubiquitous computing, wireless and ad-hoc networking, wearable computing and related areas. Because it is readable and self-contained, it will also prove valuable to managers, analysts, technology watchers and end users who want to understand the new opportunities and risks of ubicomp.

      Author Biography

      Frank Stajano is the author of Security for Ubiquitous Computing , published by Wiley.

      Table of Contents

      About the Author.

      Forward.

      Preface.

      Acknowledgements.

      Contact Information.

      1. Introduction.

      Scenario.

      Essential terminology.

      Problems.

      Notation.

      2. Ubiquitous computing.

      Xerox PARC.

      Norman's Invisible Computer.

      MIT.

      HP's Cooltown.

      ORL/AT&T Labs Cambridge.

      Security issues.

      3. Computer security.

      Confidentiality.

      Integrity.

      Availability.

      Authentication.

      Security policies.

      4. Authentication.

      New preconditions.

      The Resurrecting Duckling security policy model.

      The many ways of being a master.

      5. Confidentiality.

      Cryptographic primitives for peanut processors.

      Personal privacy.

      6. Integrity.

      Message integrity.

      Device integrity.

      7. Availability.

      Threats to the communications channel.

      Threats to the battery energy.

      Threats from mobile code.

      8. Anonymity.

      The Cocaine Auction Protocol.

      The anonymity layer.

      9. Conclusions.

      Appendix A: A Short Primer on Functions.

      Appendix B: Existing Network Security Solutions.


      Annotated bibliography.

      Index.

      Review

      "...a remarkably readable introduction to the topic...rich in background material." (IEEE Network, New Books & Multimedia Column, November 2002)

      Long Description

      Ubiquitous computing (ubicomp) is about networked microprocessors embedded in everyday objects: not just cellphones and home appliances but also books, bookshelves, bus stops and bathtubs. This future is closer than you might imagine. The insecurity of networked PCs is notorious. If we deployed ubicomp systems as vulnerable as PCs, the risks for society would be catastrophic. How can we do better, and what are the new problems? In a very accessible style, this book provides a coherent framework to make sense of the many issues at stake. Features include: An introduction to the state of the art in ubicomp research. A readable primer on security and cryptology. An up-to-date technical treatment of ubicomp security, including a sceptical look at Bluetooth and 802.11. "Peer-to-peer" and ad-hoc networking. An in-depth discussion of specific, cutting-edge solutions. An extensively annotated bibliography. Security for Ubiquitous Computing combines clarity, brevity and authority. It will appeal to developers and researchers in ubiquitous computing, wireless and ad-hoc networking, wearable computing and related areas. Because it is readable and self-contained, it will also prove valuable to managers, analysts, technology watchers and end users who want to understand the new opportunities and risks of ubicomp.

      Review Text

      "...a remarkably readable introduction to the topic...rich in background material." (IEEE Network, New Books & Multimedia Column, November 2002)

      Review Quote

      "...a remarkably readable introduction to the topic...rich in background material." ( IEEE Network , New Books & Multimedia Column, November 2002)

      Promotional "Headline"

      "...a remarkably readable introduction to the topic...rich in background material." (IEEE Network, New Books & Multimedia Column, November 2002)

      Feature

      Focuses on two very hot topics--ad-hoc wireless networking and security.

      • Covers security issues for well-established and widely-used technologies such as GSM, Bluetooth and IP.
      • Provides a technical overview of the state-of-the-art in security research as applied to ubiquitous computing systems.
      • Presents a framework to enable readers to make sense of the many and varied issues at stake, a taxonomy of the major problems and in-depth discussion of some specific, cutting-edge solutions.
      • Includes a primer on security and the basics of cyptography (although heavy-duty math has been avoided).

      Details

      ISBN0470844930
      Author Frank Stajano
      Short Title SECURITY FOR UBIQUITOUS COMPUT
      Language English
      ISBN-10 0470844930
      ISBN-13 9780470844939
      Media Book
      Format Hardcover
      DEWEY 005.8
      Illustrations Yes
      Year 2002
      Alternative 9780470848692
      Affiliation University of Cambridge, UK
      Edition 1st
      Imprint John Wiley & Sons Inc
      Place of Publication New York
      Country of Publication United States
      DOI 10.1604/9780470844939
      Series Number 1
      UK Release Date 2002-02-12
      AU Release Date 2002-03-15
      NZ Release Date 2002-03-15
      Publisher John Wiley & Sons Inc
      Series Wiley Series on Communications Networking & Distributed Systems
      Publication Date 2002-02-12
      Audience Professional & Vocational
      US Release Date 2002-02-12
      Pages 272

      TheNile_Item_ID:126609221;
    ★ Recommended Products Related To This Item
    ♥ Best Selling Products in this category