000 01244nam a22003735i 4500
001 978-1-84996-275-9
003 DE-He213
005 20130515021205.0
007 cr nn 008mamaa
008 100628s2010 xxk| s |||| 0|eng d
020 _a9781849962759
_9978-1-84996-275-9
024 7 _a10.1007/978-1-84996-275-9
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM075000
_2bisacsh
082 0 4 _a004.6
_223
100 1 _aHolt, Alan.
245 1 0 _a802.11 Wireless Networks
_h[electronic resource] :
_bSecurity and Analysis /
_cby Alan Holt, Chi-Yu Huang.
260 _aLondon :
_bSpringer London,
_c2010.
300 _bdigital.
490 0 _aComputer Communications and Networks,
_x1617-7975
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 1 4 _aComputer Science.
650 2 4 _aComputer Communication Networks.
700 1 _aHuang, Chi-Yu.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781849962742
830 0 _aComputer Communications and Networks,
_x1617-7975
856 4 0 _uhttp://dx.doi.org/10.1007/978-1-84996-275-9
912 _aZDB-2-SCS
999 _c74832
_d74832