000 01760nam a2200409 a 4500
001 0000126762
005 20171002060811.0
006 m u
007 cr cn|||||||||
008 101005s2010 si a sb 000 0 eng d
010 _z 2010484097
020 _z9789814271080
020 _z981427108X
020 _z9789814271097 (e-book)
035 _a(CaPaEBR)ebr10422496
035 _a(OCoLC)670429880
040 _aCaPaEBR
_cCaPaEBR
050 1 4 _aTK5105.59
_b.B49 2010eb
100 1 _aBeyah, Raheem
_q(Raheem A.),
_d1976-
245 1 0 _aSecurity in ad hoc and sensor networks
_h[electronic resource] /
_cRaheem Beyah, Janise McNair, Cherita Corbett.
260 _aSingapore ;
_aHackensack, N.J. :
_bWorld Scientific,
_cc2010.
300 _axii, 406 p. :
_bill. (some col.).
490 1 _aSeries in computer and network security ;
_vv. 3
504 _aIncludes bibliographical references.
505 0 _apt. 1. Authentication and confidentiality -- pt. 2. Privacy -- pt. 3. Reliability -- pt. 4. Network management and configuration.
533 _aElectronic reproduction.
_bPalo Alto, Calif. :
_cebrary,
_d2013.
_nAvailable via World Wide Web.
_nAccess may be limited to ebrary affiliated libraries.
650 0 _aSensor networks
_xSecurity measures.
650 0 _aWireless communication systems
_xSecurity measures.
650 0 _aComputer networks
_xSecurity measures.
655 7 _aElectronic books.
_2local
700 1 _aMcNair, Janise
_q(Janise Yvette),
_d1968-
700 1 _aCorbett, Cherita
_q(Cherita L.)
710 2 _aebrary, Inc.
830 0 _aComputer and network security ;
_vv. 3.
856 4 0 _uhttp://site.ebrary.com/lib/daystar/Doc?id=10422496
_zAn electronic book accessible through the World Wide Web; click to view
908 _a170314
942 0 0 _cEB
999 _c115911
_d115911