01325nam a2200349Ia 4500001001200000003000800012006001900020007001500039008004100054010001700095020001500112020001500127040002100142035002100163050002600184100002500210245009700235260003600332300002400368490004200392504005100434533015200485650004500637650002300682655002900705700002100734700001700755710001700772830004300789856012600832999001700958ebr10082041CaPaEBRm u cr cn|||||||||040420s2004 maua sb 001 0ceng d z 2004049721 z1580538851 z1580535046 aCaPaEBRcCaPaEBR a(OCoLC)55985851514aTK5103.3b.G44 2004eb1 aGehrmann, Christian.10aBluetooth securityh[electronic resource] /cChristian Gehrmann, Joakim Persson, Ben Smeets. aBoston :bArtech House,cc2004. axii, 204 p. :bill.1 aArtech House computer security series aIncludes bibliographical references and index. aElectronic reproduction.bPalo Alto, Calif. :cebrary,d2009.nAvailable via World Wide Web.nAccess may be limited to ebrary affiliated libraries. 0aBluetooth technologyxSecurity measures. 0aComputer security. 7aElectronic books.2local1 aPersson, Joakim.1 aSmeets, Ben.2 aebrary, Inc. 0aArtech House computer security series.40uhttp://site.ebrary.com/lib/rucke/Doc?id=10082041zAn electronic book accessible through the World Wide Web; click to view c55198d55198