Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200613 a 4500 
001    898422491 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr cnu---unuuu 
008    141220t20142014ne a    ob    000 0 eng d 
019    899588018|a908649745|a1105178721|a1105571861|a1166358098 
020    9780128022238|q(electronic bk.) 
020    012802223X|q(electronic bk.) 
029 1  CHNEW|b000889689 
029 1  CHNEW|b001001095 
029 1  CHNEW|b001026545 
029 1  DEBBG|bBV043615711 
029 1  DEBSZ|b431869170 
029 1  DEBSZ|b434137774 
035    (OCoLC)898422491|z(OCoLC)899588018|z(OCoLC)908649745
       |z(OCoLC)1105178721|z(OCoLC)1105571861|z(OCoLC)1166358098 
037    itpro 
040    EBLCP|beng|epn|cEBLCP|dN$T|dUIU|dOCLCQ|dYDXCP|dOCLCF|dSTF
       |dDEBSZ|dOCLCO|dCOO|dOCLCQ|dOCLCO|dOCLCQ|dCOD|dB24X7|dOTZ
       |dLIV|dMERUC|dOCLCA|dD6H|dU3W|dOCLCQ|dWYU|dOCLCQ|dVT2|dLQU
       |dBRF|dOCLCO|dOCLCQ|dOCLCO|dOCLCL 
049    INap 
082 04 005.71376 
082 04 005.71376|223 
099    eBook O'Reilly for Public Libraries 
100 1  Naraei, Parisa,|eauthor. 
245 10 Optimizing IEEE 802.11i resource and security essentials :
       |bfor mobile and stationary devices /|cParisa Naraei, Iraj
       Sadegh Amiri, Iman Saberi ; James Yu, technical editor.
       |h[O'Reilly electronic resource] 
260    Amsterdam :|bSyngress is an imprint of Elsevier,|c[2014] 
264  4 |c©2014 
300    1 online resource (xvi, 52 pages) :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
504    Includes bibliographical references. 
520    The research in this book covers how to best balance 
       security concerns with limited resources available on 
       wireless devices as well as how to optimize security 
       resources on higher-end non-mobile devices. Two modes for 
       802.11i for two different groups of devices is suggested 
       and evaluated with the current encryption method for AES-
       CCMP to compare the performance. Banking, healthcare, and 
       the military are all vital industries that rely on 
       wireless security for a huge section of their operations. 
       Security experts of today and tomorrow will learn a lot 
       from this resource and it can be used for master level in 
       computer science, information security, wireless network 
       security and cryptography. --|cEdited summary from book. 
588 0  Print version record. 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Computer security|vSoftware. 
650  6 Sécurité informatique|vLogiciels. 
650  7 Computer security|2fast 
655  7 Software|2fast 
700 1  Amiri, Iraj Sadegh,|d1977-|eauthor.|1https://id.oclc.org/
       worldcat/entity/E39PCjvdBxR7D43j3qrmGqTkcP 
700 1  Saberi, Iman,|eauthor. 
700 1  Yu, James,|etechnical editor. 
776 08 |iPrint version:|aAmiri, I.S.|tOptimizing IEEE 802.11i 
       Resource and Security Essentials : For Mobile and 
       Stationary Devices.|dBurlington : Elsevier Science, ©2014
       |z9780128022221 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9780128022221/?ar
       |zAvailable on O'Reilly for Public Libraries 
938    Books 24x7|bB247|nbks00078684 
938    EBSCOhost|bEBSC|n927793 
938    YBP Library Services|bYANK|n12206720 
994    92|bJFN