ContentsAbouttheAuthorsxiiiPrefacexvAcknowledgementsxviiListofAcronymsxixPartOneWirelessAdHoc,SensorandMeshNetworking11Introduction31.1InformationSecurity41.1.1ComputerSecurity41.1.2CommunicationsSecurity51.2ScopeoftheBook51.3StructureoftheBook61.4ElectronicResourcesfortheBook71.5ReviewQuestions72W