Flylib.com
IP Location
IP Location
ISBN: 0072263776
EAN: 2147483647
Year: 2004
Pages: 129
Authors:
Martin Dawson
,
James Winterbottom
,
Martin Thomson
BUY ON AMAZON
Table of Contents
Back Cover
IP Location
Foreword
Introduction
Why a Book on IP Location?
References
Chapter 1: A Brief History of Location Services and Concepts
Emergency Services: A Case Study of an Important Location-Based Service
Uncertainty and Confidence in Location Determination
The Rise of VoIP and the Creation of an IP Location Imperative
Literal Location vs. Location Reference
A Question of Trust
The LIS: A Location Server for Access Networks
A Generic Architecture
Reference
Chapter 2: Location, Presence, and Privacy
The GEOPRIV Model
The PIDF-LO
Controlling Access to Location Information
References
Chapter 3: Location Determination and the Access Location Entity
Location Measurements
The Flexible LIS-ALE Protocol (FLAP)
Acquiring Measurements from the TargetDevice
References
Chapter 4: The LIS, Location Acquisition, and the HELD Protocol
The HELD Protocol and Semantics
LIS Discovery Using DNS
Types of LIS
Summary
References
Chapter 5: IP Location in Enterprise Networks
Location Determination in Enterprise Networks
Location Acquisition Alternatives and Comparisons to HELD
Enterprise Location Considerations
Enterprise Location Applications
Enterprise Location Conclusions
References
Chapter 6: IP Location in Wireline Public Carrier Networks
Cable Networks
Summary
References
Chapter 7: WiFi and Ad Hoc Wireless Networks
802.11 Wireless LANs
Basic Wireless Location Determination Toolset
Ad Hoc Location Determination Methods
Architectural Considerations
Location Support in 802.11v
IP Mobility and Location Acquisition
References
Chapter 8: IP Location in Wireless Public Carrier Networks
Cellular Data Networks
WiMAX
Location in an Open Services Network
Location in an IMS Network
Summary
References
Chapter 9: Device Interactions in Location Determination
The Role of the Device in the Location Architecture
Autonomous Location Determination
Location Measurements in HELD
Device-Based Technologies
Summary
References
Chapter 10: Privacy Considerations for Internet Location
Privacy Legislation
Location Privacy Mechanisms in 3GPP
Gaining Consent
Simplifying Privacy
Architectures for Privacy Protection
Focus on Law Enforcement
References
Appendix A: Abridged Flap Specification
FLAP Messages
Extensions
FLAP Base XML Schema
Access Technology Extensions
References
Appendix B: HELD Base Schema
Appendix C: Digital Signature for PIDF-LO
What Needs to Be Signed
The Digital Signature
XML Definitions
Example
Security Considerations
References
Appendix D: HELD Protocol Bindings
The HELD BEEP Protocol Binding
References
Appendix E: HELD Identity Extensions
Identity Extension Examples
Glossary
A-B
C-F
G-I
L-M
N-P
Q-S
T-V
W-X
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
List of Figures
List of Tables
List of Sidebars
IP Location
ISBN: 0072263776
EAN: 2147483647
Year: 2004
Pages: 129
Authors:
Martin Dawson
,
James Winterbottom
,
Martin Thomson
BUY ON AMAZON
Snort Cookbook
Capturing and Viewing Packets
Logging Alerts to a Database
Logging to Email
Not Logging
Analyzing Sniffed (Pcap) Traffic
Network Security Architectures
Avoid Security Through Obscurity
Emerging Security Technologies
VPN Basics
Threat Mitigation
References
MySQL Clustering
Testing Your Cluster
Using Multiple Management Nodes
Security for MySQL Cluster
Running MySQL in a Chrooted Environment
Data Retrieval in MySQL Cluster
Introduction to 80x86 Assembly Language and Computer Architecture
Representing Data in a Computer
Basic Instructions
String Operations
Bit Manipulation
Appendix D 80x86 Instructions (by Mnemonic)
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
Prerequisites
Configuring Your PostgreSQL Runtime Environment
Summary
Internationalization and Localization
Using Full-text Search
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 3. Connect Mac OS X with a Bluetooth Phone
Hack 44. Authenticate Wireless Users
Hack 59. Scan for Wireless Networks Automatically
Hack 84. Spider Omni Antenna
Section A.3. 802.11b: The De Facto Standard
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies