Bluetooth Security

Satheesh C B | Wednesday, February 27, 2008 | 0 comments

Author(s): Christian Gehrmann, Joakim Persson, Ben Smeets
Publisher: Artech House |Language: English
File type: PDF |Pages: 221 |Size (for download): 0.7 Mb

This first-of-its-kind book, from expert authors actively contributing to the evolution of Bluetooth specifications, provides an overview and detailed descriptions of all the security functions and features of this standard?s latest core release. After categorizing all the security issues involved in ad hoc networking, this hands-on volume shows you how to design a highly secure Bluetooth system and implement security enhancements. The book also helps you fully understand the main security risks involved with introducing Bluetooth-based communications in your organization.
This cutting-edge resource examines all known attacks on Bluetooth security mechanisms and their implementations, demonstrating how some of these known weaknesses can be avoided with appropriate defensive measures. The book presents concrete examples of how to design security solutions for some Bluetooth applications and products built on these applications. You find real-world case studies including technical algorithms, mechanisms and protocols, and security architectures. These architectures offer valuable guidelines for use in building Bluetooth and non-Bluetooth-specific security mechanisms.


Category: ,

Welcome to SparksSpace . This blog launched on Dec 2007 with a focus on Technology.You can find latest Computer Software, Tutorials, Tricks,Tips & Software promotions here!