Chapter 12

Managing Bluetooth Security

E. Eugene Schultz, Matthew W. A. Pemble, and Wendy Goucher

Mobile computing technology has been one of the true revolutions of the early twenty-first century. One of the most popular technologies within the mobile computing arena is Bluetooth technology, which allows different devices to connect to one other without complications such as having to manually synchronize them with each other. Like any other type of mobile technology, Bluetooth has a number of inherent security vulnerabilities that give rise to ...

Get Information Security Management Handbook, Volume 6, 6th Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.