Cover Image
Saved in:

Bluetooth security attacks : comparative analysis, attacks, and countermeasures /

Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literatur...

Full description

Bibliographic Details
Main Author: Haataja, Keijo, (Author)
Corporate Author: SpringerLink (Online service)
Format: Online Book
Published: Heidelberg : Springer, 2013.
Series:SpringerBriefs in computer science
Online Access:Online version
Tags: Add Tag
No Tags, Be the first to tag this record!