This first-of-its-kind book, from expert authors actively contributing to the evolution of Bluetooth specifications, provides an overview and detailed descriptions of all the security functions and features of this standardOCOs latest core release. After categorizing all the security issues involved in ad hoc networking, this hands-on volume shows you how to design a highly secure Bluetooth system and implement security enhancements. The book also helps you fully understand the main security risks involved with introducing Bluetooth-based communications in your organization.qWe assume that when a DT user subscribes to a LAN access service, that user gets a unique ID that identifies the service ... The DT user (or someone acting on behalf of the DT user) needs to enter the pass-key manually into the device, in its anbsp;...
|Author||:||Christian Gehrmann, Joakim Persson, Ben Smeets|
|Publisher||:||Artech House - 2004-01-01|