Home Page Icon
Home Page
Table of Contents for
End User License Agreement
Close
End User License Agreement
by Manju Khari, Manisha Bharti, M. Niranjanamurthy
Wireless Communication Security
Cover
Series Page
Title Page
Copyright Page
Preface
1 M2M in 5G Cellular Networks: Challenges, Proposed Solutions, and Future Directions
2 MAC Layer Protocol for Wireless Security
3 Enhanced Image Security Through Hybrid Approach: Protect Your Copyright Over Digital Images
4 Quantum Computing
5 Feature Engineering for Flow-Based IDS
6 Environmental Aware Thermal (EAT) Routing Protocol for Wireless Sensor Networks
7 A Comprehensive Study of Intrusion Detection and Prevention Systems
8 Hardware Devices Integration With IoT
9 Depth Analysis On DoS & DDoS Attacks
10 SQL Injection Attack on Database System
11 Machine Learning Techniques for Face Authentication System for Security Purposes
12 Estimation of Computation Time for Software-Defined Networking‑Based Data Traffic Offloading System in Heterogeneous Network
About the Editors
Index
Also of Interest
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Also of Interest
WILEY END USER LICENSE AGREEMENT
Go to
www.wiley.com/go/eula
to access Wiley’s ebook EULA.
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset