000418249 000__ 01663cam\a2200397\a\4500 000418249 001__ 418249 000418249 005__ 20210513144751.0 000418249 006__ m\\\\\\\\u\\\\\\\\ 000418249 007__ cr\cn||||||||| 000418249 008__ 101005s2010\\\\si\a\\\\sb\\\\000\0\eng\d 000418249 010__ $$z 2010484097 000418249 020__ $$z9789814271080 000418249 020__ $$z981427108X 000418249 020__ $$z9789814271097 (e-book) 000418249 035__ $$a(CaPaEBR)ebr10422496 000418249 035__ $$a(OCoLC)670429880 000418249 040__ $$aCaPaEBR$$cCaPaEBR 000418249 05014 $$aTK5105.59$$b.B49 2010eb 000418249 1001_ $$aBeyah, Raheem$$q(Raheem A.),$$d1976- 000418249 24510 $$aSecurity in ad hoc and sensor networks$$h[electronic resource] /$$cRaheem Beyah, Janise McNair, Cherita Corbett. 000418249 260__ $$aSingapore ;$$aHackensack, N.J. :$$bWorld Scientific,$$cc2010. 000418249 300__ $$axii, 406 p. :$$bill. (some col.) ;$$c24 cm. 000418249 4901_ $$aSeries in computer and network security ;$$vv. 3 000418249 504__ $$aIncludes bibliographical references. 000418249 5050_ $$apt. 1. Authentication and confidentiality -- pt. 2. Privacy -- pt. 3. Reliability -- pt. 4. Network management and configuration. 000418249 506__ $$aAccess limited to authorized users. 000418249 650_0 $$aSensor networks$$xSecurity measures. 000418249 650_0 $$aWireless communication systems$$xSecurity measures. 000418249 650_0 $$aComputer networks$$xSecurity measures. 000418249 655_7 $$aElectronic books.$$2lcsh 000418249 7001_ $$aMcNair, Janise$$q(Janise Yvette),$$d1968- 000418249 7001_ $$aCorbett, Cherita$$q(Cherita L.) 000418249 830_0 $$aComputer and network security ;$$vv. 3. 000418249 852__ $$bebk 000418249 85640 $$3ProQuest Ebook Central Academic Complete$$uhttps://univsouthin.idm.oclc.org/login?url=http://site.ebrary.com/lib/usiricelib/Doc?id=10422496$$zOnline Access 000418249 909CO $$ooai:library.usi.edu:418249$$pGLOBAL_SET 000418249 980__ $$aEBOOK 000418249 980__ $$aBIB 000418249 982__ $$aEbook 000418249 983__ $$aOnline