Computer sind allgegenwärtige Begleiter unseres Alltags - in Telefonen, Waschmaschinen, Fernsehgeräten, Heizungssystemen, Smart Cards und vielen anderen Geräten. In diesem Buch wird beschrieben, wie alle diese Systeme über drahtlose Netzwerke miteinander kommunizieren können. Insbesondere wird auf die derzeit entwickelten Techniken und Protokolle eingegangen, mit denen sich absichern lä t, da die Systeme vor unberechtigtem Zugriff geschützt sind und die Daten den richtigen Empfänger erreichen. Dieser Band ist weder ein "Kochbuch" mit Anleitungen zur Implementierung noch ein enzyklopädisches Handbuch. Es bietet Ihnen vielmehr einen Rahmen zum Verständnis der Technologie, eine Kategorisierung der wichtigsten Probleme und eine tiefgründige Diskussion einiger spezifischer Lösungen. Nützlich ist die allgemeine, gut verständliche Einführung in die Sicherheitstechnik und die Grundlagen der Kryptographie.
This book is understandable by both the technical and lay person. It provides an overview of what UbiComp is including many real life examples. Then goes on to give examples of the security violations that could result from these technologies. Some of them obvious and others pretty insightful (especially the one about RFID tags). The book then delves into general security concepts in more detail and finishes off with some greatly named concepts: "The resurrecting duckling policy" and "the cocaine auction protocol".The appendix has a review on some math if you want to learn it or refresh your memory. The writing style is very clear and peppered with examples. This book as no ambiguous notation. That in itself is impressive for any technical volume. Amazingly, all that is contained in this very thin book.
Great Book
Published by Thriftbooks.com User , 22 years ago
This is an excellent book and well written. It sits between being a book on UbiComp and one on security and does a greatjob of explaining both fields to each other. The examples chosen are from the authors own history and so he speaks withauthority on them. The author is balanced in that he gives theminus points on various technologies etc as well as the pluspoints.After an introduction the author spends two chapters explainingUbiComp and security from a general perspective. Both are wellwritten and require no prior knowledge. He then in the remaining chapters goes on to address the particular security concerns in the UbiComp environment.I thoroughly recommend this
Great for researchers and anyone into ubiquitous computing
Published by Thriftbooks.com User , 23 years ago
Great for researchers and everyone who is interested in ubiquitous computing, which may very well be the future of computing. The book in general gives a high-level overview of available technology and security issues/requirements needed for this technology. One drawback is that the book will probably become obsolete after sometime as ubiquitous computing is evolving relatively fast..
ThriftBooks sells millions of used books at the lowest everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15. ThriftBooks.com. Read more. Spend less.