Skip to Main Content
Wireless Security: Know It All
book

Wireless Security: Know It All

by Praphul Chandra, Frank Thornton, Chris Lanthem, Jon S. Wilson, Dan Bensky, Tony Bradley, Chris Hurley, Steve A. Rackley, John Rittinghouse PhD CISM, James F. Ransome PhD CISM CISSP, Timothy Stapko, George L Stefanek
April 2011
Intermediate to advanced content levelIntermediate to advanced
744 pages
21h 41m
English
Newnes
Content preview from Wireless Security: Know It All

Chapter 23. Wireless Embedded System Security

23.1. Wireless Technologies

Wireless applications essentially combine all of the reasons we need security for embedded systems with limited resources. By definition, many wireless devices will require limited resources, because they will be designed to run on batteries or in environments where available resources must be given to the communications hardware. In the world of inexpensive embedded systems (we exclude inexpensive consumer products from this category; we are referring more to industrial-type controllers), wireless technologies are only just starting to make inroads into the industry. Sure, cellular phones and PDAs have had wireless technologies built-in for some time, but those implementations ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Wireless and Mobile Device Security

Wireless and Mobile Device Security

Jim Doherty
802.11 Security

802.11 Security

Bob Fleck, Bruce Potter
Securing the Internet of Things

Securing the Internet of Things

Shancang Li, Li Da Xu

Publisher Resources

ISBN: 9781856175296