FUNDAMENTALS OF MOBILE AND PERVASIVE COMPUTING
1st Edition
0070603642
·
9780070603646
© 2005 | Published: September 6, 2005
This book details the engineering principles underlying mobile computing, serving as a basic reference as text for graduate and advanced undergraduates. It is the first systematic explanation of mobile communications as a discipline in itself, contai…
Read More
Chapter 1: Mobile Adaptive Computing
Chapter 2: Mobility Management
Chapter 3: Data Dissemination and Management
Chapter 4: Context-Aware Computing
Chapter 5: Introduction to Mobile Middleware
Chapter 6: Middleware for Application Development: Adaptation and Agents
Chapter 7: Service Discovery Middleware: Finding Needed Services
Chapter 8: Introduction to Ad Hoc and Sensor Networks
Chapter 9: Challenges
Chapter 10: Protocols
Chapter 11: Approaches and Solutions
Chapter 12: Wireless Security
Chapter 13: Approaches to Security
Chapter 14: Security in Wireless Personal Area Networks
Chapter 15: Security in Wireless Local Area Networks
Chapter 16: Security in Wireless Metropolitan Area Networks (802.16)
Chapter 17: Security in Wide Area Networks
APPENDIX A: BRIEF INTRODUCTION TO WIRELESS COMMUNICATION AND NETWORKING
APPENDIX B: QUESTIONS
INDEX
BIBLIOGRAPHY
GLOSSARY
REFERENCES
Chapter 3: Data Dissemination and Management
Chapter 4: Context-Aware Computing
Chapter 5: Introduction to Mobile Middleware
Chapter 6: Middleware for Application Development: Adaptation and Agents
Chapter 7: Service Discovery Middleware: Finding Needed Services
Chapter 8: Introduction to Ad Hoc and Sensor Networks
Chapter 9: Challenges
Chapter 10: Protocols
Chapter 11: Approaches and Solutions
Chapter 12: Wireless Security
Chapter 13: Approaches to Security
Chapter 14: Security in Wireless Personal Area Networks
Chapter 15: Security in Wireless Local Area Networks
Chapter 16: Security in Wireless Metropolitan Area Networks (802.16)
Chapter 17: Security in Wide Area Networks
APPENDIX A: BRIEF INTRODUCTION TO WIRELESS COMMUNICATION AND NETWORKING
APPENDIX B: QUESTIONS
INDEX
BIBLIOGRAPHY
GLOSSARY
REFERENCES
Chapter 5: Introduction to Mobile Middleware
Chapter 6: Middleware for Application Development: Adaptation and Agents
Chapter 7: Service Discovery Middleware: Finding Needed Services
Chapter 8: Introduction to Ad Hoc and Sensor Networks
Chapter 9: Challenges
Chapter 10: Protocols
Chapter 11: Approaches and Solutions
Chapter 12: Wireless Security
Chapter 13: Approaches to Security
Chapter 14: Security in Wireless Personal Area Networks
Chapter 15: Security in Wireless Local Area Networks
Chapter 16: Security in Wireless Metropolitan Area Networks (802.16)
Chapter 17: Security in Wide Area Networks
APPENDIX A: BRIEF INTRODUCTION TO WIRELESS COMMUNICATION AND NETWORKING
APPENDIX B: QUESTIONS
INDEX
BIBLIOGRAPHY
GLOSSARY
REFERENCES
Chapter 7: Service Discovery Middleware: Finding Needed Services
Chapter 8: Introduction to Ad Hoc and Sensor Networks
Chapter 9: Challenges
Chapter 10: Protocols
Chapter 11: Approaches and Solutions
Chapter 12: Wireless Security
Chapter 13: Approaches to Security
Chapter 14: Security in Wireless Personal Area Networks
Chapter 15: Security in Wireless Local Area Networks
Chapter 16: Security in Wireless Metropolitan Area Networks (802.16)
Chapter 17: Security in Wide Area Networks
APPENDIX A: BRIEF INTRODUCTION TO WIRELESS COMMUNICATION AND NETWORKING
APPENDIX B: QUESTIONS
INDEX
BIBLIOGRAPHY
GLOSSARY
REFERENCES
Chapter 9: Challenges
Chapter 10: Protocols
Chapter 11: Approaches and Solutions
Chapter 12: Wireless Security
Chapter 13: Approaches to Security
Chapter 14: Security in Wireless Personal Area Networks
Chapter 15: Security in Wireless Local Area Networks
Chapter 16: Security in Wireless Metropolitan Area Networks (802.16)
Chapter 17: Security in Wide Area Networks
APPENDIX A: BRIEF INTRODUCTION TO WIRELESS COMMUNICATION AND NETWORKING
APPENDIX B: QUESTIONS
INDEX
BIBLIOGRAPHY
GLOSSARY
REFERENCES
Chapter 11: Approaches and Solutions
Chapter 12: Wireless Security
Chapter 13: Approaches to Security
Chapter 14: Security in Wireless Personal Area Networks
Chapter 15: Security in Wireless Local Area Networks
Chapter 16: Security in Wireless Metropolitan Area Networks (802.16)
Chapter 17: Security in Wide Area Networks
APPENDIX A: BRIEF INTRODUCTION TO WIRELESS COMMUNICATION AND NETWORKING
APPENDIX B: QUESTIONS
INDEX
BIBLIOGRAPHY
GLOSSARY
REFERENCES
Chapter 13: Approaches to Security
Chapter 14: Security in Wireless Personal Area Networks
Chapter 15: Security in Wireless Local Area Networks
Chapter 16: Security in Wireless Metropolitan Area Networks (802.16)
Chapter 17: Security in Wide Area Networks
APPENDIX A: BRIEF INTRODUCTION TO WIRELESS COMMUNICATION AND NETWORKING
APPENDIX B: QUESTIONS
INDEX
BIBLIOGRAPHY
GLOSSARY
REFERENCES
Chapter 15: Security in Wireless Local Area Networks
Chapter 16: Security in Wireless Metropolitan Area Networks (802.16)
Chapter 17: Security in Wide Area Networks
APPENDIX A: BRIEF INTRODUCTION TO WIRELESS COMMUNICATION AND NETWORKING
APPENDIX B: QUESTIONS
INDEX
BIBLIOGRAPHY
GLOSSARY
REFERENCES
Chapter 17: Security in Wide Area Networks
APPENDIX A: BRIEF INTRODUCTION TO WIRELESS COMMUNICATION AND NETWORKING
APPENDIX B: QUESTIONS
INDEX
BIBLIOGRAPHY
GLOSSARY
REFERENCES
APPENDIX B: QUESTIONS
INDEX
BIBLIOGRAPHY
GLOSSARY
REFERENCES
BIBLIOGRAPHY
GLOSSARY
REFERENCES
REFERENCES
This book details the engineering principles underlying mobile computing, serving as a basic reference as text for graduate and advanced undergraduates. It is the first systematic explanation of mobile communications as a discipline in itself, containing Exercises, projects, and solutions.