Cognitive radio networking and security : a game-theoretic view
| Main Author: | Liu, K.J. Ray 1961- |
|---|---|
| Other Authors: | Wang, Beibei |
| Format: | Book |
| Published: |
Cambridge :
Cambridge University Press ,
2011
|
| Subjects: |
Similar Items
Security in fixed and wireless networks : an introduction to securing data communications
by: Schafer, Gunter
Published: (2003)
by: Schafer, Gunter
Published: (2003)
Home wireless networking in a snap
by: Habraken, Joe
Published: (2006)
by: Habraken, Joe
Published: (2006)
Network security : a beginner's guide
by: Maiwald, Eric
Published: (2001)
by: Maiwald, Eric
Published: (2001)
Network security bible
by: Cole, Eric
Published: (2009)
by: Cole, Eric
Published: (2009)
Network security architectures
by: Convery, Sean
Published: (2004)
by: Convery, Sean
Published: (2004)
Fundamentals of network security
by: Maiwald, Eric
Published: (2004)
by: Maiwald, Eric
Published: (2004)
Mobile access safety : beyond BYOD
by: Assing, Dominique
Published: (2013)
by: Assing, Dominique
Published: (2013)
Wireless communications resource management
by: Lee, Byeong Gi
Published: (2009)
by: Lee, Byeong Gi
Published: (2009)
Wireless security : models, threats and solutions
by: Nichols, Randall K.
Published: (2002)
by: Nichols, Randall K.
Published: (2002)
Wireless networks : design and intergtion for LTE, EVDO, HSPA and WIMAX
by: Smith, Clint
Published: (2014)
by: Smith, Clint
Published: (2014)
Intelligent sensor networks : the integration of sensor networks, signal processing and machine learning
Published: (2013)
Published: (2013)
Bakelite radios
by: Hawes, Robert
Published: (1996)
by: Hawes, Robert
Published: (1996)
Principles of information security
by: Whitman, Michael E.
Published: (2003)
by: Whitman, Michael E.
Published: (2003)
Wireless sensor networks : current status and future trends
Published: (2013)
Published: (2013)
Mobile telecommunications protocols for data networks
by: Hac, Anna
Published: (2003)
by: Hac, Anna
Published: (2003)
Security risk management : building an information security risk management program from the ground up
by: Wheeler, Evan
Published: (2011)
by: Wheeler, Evan
Published: (2011)
LAN switch security : what hackers know about your switches
by: Vyncke, Eric
Published: (2008)
by: Vyncke, Eric
Published: (2008)
Network forensics
by: Messier, Ric
Published: (2017)
by: Messier, Ric
Published: (2017)
Hacking exposed wireless : wireless security secrets and solutions
by: Wright, Joshua
Published: (2015)
by: Wright, Joshua
Published: (2015)
Communication Networks : Fundamental Concepts and key
by: Leon-Garcia, Alberto
Published: (2000)
by: Leon-Garcia, Alberto
Published: (2000)
Computer security fundamentals
by: Easttom, Chuck
Published: (2012)
by: Easttom, Chuck
Published: (2012)
Elementary information security
by: Smith, Richard E.
Published: (2016)
by: Smith, Richard E.
Published: (2016)
3G wireless networks
by: Smith, Clint
Published: (2002)
by: Smith, Clint
Published: (2002)
The complete reference : Information security
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
24 deadly sins of software security : programming flaws and how to fix them
by: Howard, Michael 1965-
Published: (2010)
by: Howard, Michael 1965-
Published: (2010)
Mobile radio comunications : second and third generation cellular and WATM systems
Published: (1999)
Published: (1999)
Build your own transistor radios
by: Quan, Ronald
Published: (2013)
by: Quan, Ronald
Published: (2013)
The complete guide to internet security
by: Merkow, Mark S
Published: (2000)
by: Merkow, Mark S
Published: (2000)
Introductory network theory
by: Blackwell, William A
Published: (1985)
by: Blackwell, William A
Published: (1985)
Fundamentals of information systems security
by: Kim, David
Published: (2012)
by: Kim, David
Published: (2012)
SELinux by example : using security enhanced Linux
by: Mayer, Frank 1961-
Published: (2006)
by: Mayer, Frank 1961-
Published: (2006)
Securing the cloud : cloud comuter security techniques and tactics
by: Winkler, Vic (J.R.)
Published: (2011)
by: Winkler, Vic (J.R.)
Published: (2011)
Securing E-Business applications and communications
by: Held, Jonathan S.
Published: (2001)
by: Held, Jonathan S.
Published: (2001)
Exploiting online game : cheating massively distributed systems
by: Hoglund, Greg
Published: (2008)
by: Hoglund, Greg
Published: (2008)
PC Magazine wireless solutions
by: Randall, Neil
Published: (2005)
by: Randall, Neil
Published: (2005)
Deploying optical networking components
by: Held, Gil
Published: (2001)
by: Held, Gil
Published: (2001)
Similar Items
-
Security in fixed and wireless networks : an introduction to securing data communications
by: Schafer, Gunter
Published: (2003) -
Home wireless networking in a snap
by: Habraken, Joe
Published: (2006) -
Network security : a beginner's guide
by: Maiwald, Eric
Published: (2001) -
Network security bible
by: Cole, Eric
Published: (2009) -
Network security architectures
by: Convery, Sean
Published: (2004)