01679nam a2200373 a 4500001001200000003000800012006001900020007001500039008004100054010001700095020001800112020001500130020002700145040002100172035002100193050002700214100003900241245011500280260006300395300003700458490005200495504004100547505013400588533015200722650004000874650005500914650004200969655002901011700004401040700003501084710001701119830004301136856012601179ebr10422496CaPaEBRm u cr cn|||||||||101005s2010 si a sb 000 0 eng d z 2010484097 z9789814271080 z981427108X z9789814271097 (e-book) aCaPaEBRcCaPaEBR a(OCoLC)67042988014aTK5105.59b.B49 2010eb1 aBeyah, Raheemq(Raheem A.),d1976-10aSecurity in ad hoc and sensor networksh[electronic resource] /cRaheem Beyah, Janise McNair, Cherita Corbett. aSingapore ;aHackensack, N.J. :bWorld Scientific,cc2010. axii, 406 p. :bill. (some col.).1 aSeries in computer and network security ;vv. 3 aIncludes bibliographical references.0 apt. 1. Authentication and confidentiality -- pt. 2. Privacy -- pt. 3. Reliability -- pt. 4. Network management and configuration. aElectronic reproduction.bPalo Alto, Calif. :cebrary,d2013.nAvailable via World Wide Web.nAccess may be limited to ebrary affiliated libraries. 0aSensor networksxSecurity measures. 0aWireless communication systemsxSecurity measures. 0aComputer networksxSecurity measures. 7aElectronic books.2local1 aMcNair, Janiseq(Janise Yvette),d1968-1 aCorbett, Cheritaq(Cherita L.)2 aebrary, Inc. 0aComputer and network security ;vv. 3.40uhttp://site.ebrary.com/lib/rucke/Doc?id=10422496zAn electronic book accessible through the World Wide Web; click to view