Amazon cover image
Image from Amazon.com
Image from Google Jackets

Fundamentals of mobile and pervasive computing / Frank Adelstein ... [et al.].

Contributor(s): Material type: TextTextPublication details: New Delhi : TMH, 2012,c2005.Description: xix, 402 p. : ill. ; 24 cmISBN:
  • 9780070603646
Subject(s): DDC classification:
  • 621.38456 22 FUN
LOC classification:
  • TK5103.2 .F86 2005
Contents:
Chapter 1: Introduction to Mobile Computing -- Chapter 2: Mobility management -- Chapter 3: Data dissemination and management -- Chapter 4: Context-Aware computing -- Chapter 5: Introduction to mobile middleware -- Chapter 6: Middleware for application development : adaption and agents -- Chapter 7: Service discovery middleware : finding needed services -- Chapter 8: Introduction to AD Hoc and sensor networks -- Chapter 9: Challenges -- Chapter 10: Protocols -- Chapter 11: Approaches and solutions -- Chapter 12: Wireless security -- Chapter 13: Approaches to security -- Chapter 14: Security in wireless personal area networks -- Chapter 15: Security in wireless local area networks -- Chapter 16: Security in wireless metropolitan area networks (802.16) -- Chapter 17: Security in wide area networks -- Appendix -- Index
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Books Books Learning Resource Centre 621.38456 FUN (Browse shelf(Opens below)) Available 5050
Total holds: 0

Includes bibliographical references and index.

Chapter 1: Introduction to Mobile Computing --
Chapter 2: Mobility management --
Chapter 3: Data dissemination and management --
Chapter 4: Context-Aware computing --
Chapter 5: Introduction to mobile middleware --
Chapter 6: Middleware for application development : adaption and agents --
Chapter 7: Service discovery middleware : finding needed services --
Chapter 8: Introduction to AD Hoc and sensor networks --
Chapter 9: Challenges --
Chapter 10: Protocols --
Chapter 11: Approaches and solutions --
Chapter 12: Wireless security --
Chapter 13: Approaches to security --
Chapter 14: Security in wireless personal area networks --
Chapter 15: Security in wireless local area networks --
Chapter 16: Security in wireless metropolitan area networks (802.16) --
Chapter 17: Security in wide area networks --
Appendix --
Index

There are no comments on this title.

to post a comment.
Powered by Koha & maintained by LRC, JK Lakshmipat University, Jaipur
Contact: [email protected]
Copyright © 2022 LRC, JK Lakshmipat University, Jaipur. All Rights Reserved.