Chapter 12

Managing Bluetooth Security

E. Eugene Schultz, Matthew W. A. Pemble, and Wendy Goucher

Mobile computing technology has been one of the true revolutions of the early twenty-first century. One of the most popular technologies within the mobile computing arena is Bluetooth technology, which allows different devices to connect to one other without complications such as having to manually synchronize them with each other. Like any other type of mobile technology, Bluetooth has a number of inherent security vulnerabilities that give rise to ...

Get Information Security Management Handbook, Volume 6, 6th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.