Security in Wireless Ad Hoc and Sensor Networksintroduces the reader to the fundamentals and key issues related towireless ad hoc networking, with an emphasis on security. Itdiscusses the security attacks and counter measures in wireless adhoc, sensor and mesh networks, and briefly presents the standardson related topics. The authors offer a clear exposition of variouschallenges and solutions in this field including bootstrapping, keydistribution and exchange, authentication issues, privacy,anonymity and tamper resilience.
This book is well suited for graduate students in computer,electrical and communications engineering and computer sciencedepartments, researchers in academia and industry, as well as C4Iengineers and officers in the military. Wireless network designersfor internet service providers and mobile communications operatorswill also find this book very useful.
Chunming Rong received his bachelors, masters and PhDdegrees in Computer Science from the University of Bergen in Norwayin 1993, 1995 and 1998, respectively. In 1995–1998, he was aresearch fellow at the University of Bergen. In 2001–2003, hewas a post-doctoral researcher funded by Simula ResearchLaboratory. Currently, he is a Professor and chair of the computerscience section at the University of Stavanger. He has also servedas an adjunct Professor at the University Graduate Centre,University of Oslo, since 2005. Professor Rong was given theConocoPhilips Communication Award (Norway) in 2007. His paper‘New Infinite Families of 3-Designs from Preparata Codesover Z4’ was awarded Editor’s Choice inDiscrete Mathematics in 1999. He is an associate editor ofthe International Journal of Computer Science & Applications(IJCSA) and served on the editorial board of theInternational Journal of Mobile Communications (IJMC)between 2003 and 2006. For the IEEE International Symposium onSecurity in Networks and Distributed Systems (SSNDS), he wasprogram chair in 2007 in Canada and general chair in 2008. For theInternational Conference on Autonomic and Trusted Computing (ATC),he was award chair in 2007 in Hong Kong and general chair in 2008in Norway. For the International Conference on UbiquitousIntelligence and Computing (UIC), he was general chair in 2008 inNorway. Professor Rong was chairman of the board of the Foundationof the Norwegian Computer Science Conference (NIK) from2005–2007, a board member of the Norwegian InformationSecurity Network (NISNet) from 2007–2011 and a member of theNorwegian Informatics Council (Nasjonalt fagråd forinformatikk). He has also been a member of the board for the‘ICT Security and Vulnerability (IKT-SoS)’ program atthe Research Council of Norway. He also currently serves in theworkgroup for Information Security in Integrated Operation at theNorwegian Oil Industry Association (OLF). As project manager, hehas received grants from the Research Council of Norway for theprojects ‘Integration of Data Processing in Oil and GasDrilling and Completion’ for 2008–2010, ‘Secureand Reliable Wireless and Ad Hoc Communications (SWACOM)’ for2006–2009 and ‘Integrated IP-based Services for SmartHome Environment (IS-Home)’ for 2007–2010. TheNorwegian Information Security Network (NISNet) also receivesannual funding from the Research Council of Norway. His researchinterests include computer and network security, wirelesscommunications, cryptography, identity management, electronicpayment, coding theory and semantic web technology.
Readers can turn to this indispensable reference guide forcomprehensive and lucid coverage of the operational, technical, andorganizational knowledge needed to harness successful andconstructive computer assisted exercises (CAX) and war games. It isgeared also toward large civilian organizations that are looking toteach and test their strategies and procedures without the addedcost of manpower. Divided into two clear parts, the bookcovers:
Fundamentals and Theory—conflict and warfare; probabilityand statistics; simulation; distributed simulation; andexperimentation and analysis
Combat Modeling, Computer Assisted Exercises, andPractice—CAX architectures; CAX process; combat modeling; CAXsupport tools; communications/information system issues, technicalrisks, and risk miti-gation; and exercise centers andfacilities
Computer Assisted Exercises and Training: A Reference Guide isindispensable reading for research engineers, computer scientists,software engineers working with modeling and simulation, homelandsecurity specialists, staff in simulation training centers,military strategists and commanders, and many others. It alsoserves as a valuable textbook for modeling and simulation coursesat the upper-undergraduate and graduate levels.
In Tubes, Andrew Blum, a correspondent at Wired magazine, takes us on an engaging, utterly fascinating tour behind the scenes of our everyday lives and reveals the dark beating heart of the Internet itself. A remarkable journey through the brave new technological world we live in, Tubes is to the early twenty-first century what Soul of a New Machine—Tracy Kidder’s classic story of the creation of a new computer—was to the late twentieth.