Fundamentals of mobile and pervasive computing /
<B>The authoritative, general reference that has been sorely missing in the field of mobile computing</b> This book teaches all the main topics via the hottest applications in a rapidlygrowing field. <li>""Big picture"" explanations of ad hoc networks and servic...
Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
New York :
McGraw-Hill,
[2005]
|
Series: | McGraw-Hill professional engineering. Communications engineering.
|
Subjects: | |
Online Access: | CONNECT |
MARC
LEADER | 00000cam a2200000Ii 4500 | ||
---|---|---|---|
001 | in00006062089 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 160413s2005 nyua ob 001 0 eng d | ||
005 | 20220713134425.2 | ||
035 | |a 1WRLDSHRocn946596219 | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d OCLCF |d EBLCP |d TOH |d C6I |d OCLCQ |d LDP |d UKAHL |d OCLCO | ||
020 | |z 9780071412377 | ||
020 | |a 9780071782586 | ||
020 | |a 0071782583 | ||
035 | |a (OCoLC)946596219 | ||
037 | |a CL0500000731 |b Safari Books Online | ||
050 | 4 | |a TK5103.2 | |
082 | 0 | 4 | |a 621.38456 |
049 | |a TXMM | ||
100 | 1 | |a Adelstein, Frank, |e author. | |
245 | 1 | 0 | |a Fundamentals of mobile and pervasive computing / |c Frank Adelstein [and three others]. |
264 | 1 | |a New York : |b McGraw-Hill, |c [2005] | |
264 | 4 | |c ©2005 | |
300 | |a 1 online resource (1 volume) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a McGraw-Hill professional engineering. Communications engineering | |
588 | |a Description based on print version record. | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Mobile adaptive computing -- Mobility management -- Data dissemination and management -- Context-aware computing -- Introduction to mobile middleware -- Middleware for application development -- Service discovery middleware -- Introduction to ad hoc and sensor networks -- Challenges -- Protocols -- Approaches and solutions -- Wireless security -- Approaches to security -- Security in wireless personal area networks -- Security in wireless local area networks -- Security in wireless metropolitan area networks -- Security in wide area networks. | |
520 | |a <B>The authoritative, general reference that has been sorely missing in the field of mobile computing</b> This book teaches all the main topics via the hottest applications in a rapidlygrowing field. <li>""Big picture"" explanations of ad hoc networks and service discovery</li><li>Exercises, projects, and solutions to illustrate core concepts</li><li>Extensive wireless security methodologies</li> | ||
590 | |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) | ||
650 | 0 | |a Wireless communication systems. | |
650 | 0 | |a Mobile computing. | |
730 | 0 | |a WORLDSHARE SUB RECORDS | |
776 | 0 | 8 | |i Print version: |t Fundamentals of mobile and pervasive computing. |d New York : McGraw-Hill, ©2005 |z 0071412379 |w (DLC) 2004062407 |w (OCoLC)56912273 |
830 | 0 | |a McGraw-Hill professional engineering. |p Communications engineering. | |
856 | 4 | 0 | |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9780071782586/?ar |z CONNECT |3 O'Reilly |t 0 |
949 | |a ho0 | ||
994 | |a 92 |b TXM | ||
998 | |a wi |d z | ||
999 | f | f | |s 8f05f7bd-71ef-47b7-b536-8c45b80e6b1a |i 7baaa3ed-2683-4c6e-bcf3-178cc0061372 |t 0 |
952 | f | f | |a Middle Tennessee State University |b Main |c James E. Walker Library |d Electronic Resources |t 0 |e TK5103.2 |h Library of Congress classification |
856 | 4 | 0 | |3 O'Reilly |t 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9780071782586/?ar |z CONNECT |