Vous voulez voir cette page en français ? Cliquez ici.


or
Sign in to turn on 1-Click ordering.
or
Amazon Prime Free Trial required. Sign up when you check out. Learn More
More Buying Choices
Have one to sell? Sell yours here
Tell the Publisher!
I'd like to read this book on Kindle

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Wireless Security End-to-End [Paperback]

Brian Carter , Russell Shumway
5.0 out of 5 stars  See all reviews (1 customer review)
List Price: CDN$ 47.99
Price: CDN$ 38.39 & FREE Shipping. Details
You Save: CDN$ 9.60 (20%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 1 left in stock (more on the way).
Ships from and sold by Amazon.ca. Gift-wrap available.
Want it delivered Tuesday, August 5? Choose One-Day Shipping at checkout.

Book Description

Sept. 5 2002 End to End
Wireless Security End to End is a comprehensive guide covering encryption, PKI, SSL, third party certificate validation, Smart card, pin authentication, device level security, threat analysis, strategies for developing a wireless security solution and a look ahead at future biometric technology all in the End to End series targeted at real-world professionals.
Wireless Security End to End is being done in the End to End series, a new series dedicated to cutting-edge technologies designed to provide proven solutions, real-world tips and best practices. The End to End series takes a no "techno-babble" modular approach in explaining cutting edge wireless technology. Special features include case studies, real-life implementations and wireless decision tree.

Product Details


Product Description

Review

"...this book has convinced me..." (Communications News, February 2003)

From the Back Cover

* A Practical Guide for IT Professionals
* Comprehensive "End-to-End" Coverage
* Real-World Perspectives, Strategies, and Solutions

The growth of 802.11b wireless LANs and other wireless technologies-including Bluetooth and WAP-has opened up a whole new frontier in network security. This practical, hands-on guide leads you through the wilderness of competing wireless security solutions-and shows you how to determine the best mix of security components for your organization. Covering everything from intrusion protection and detection to VPNs, event correlation, encryption, antenna placement, and the pros and cons of specific wireless security models, it's all you need to settle on the right wireless security plan-and get it implemented.

Lock Down Wireless Networks
* Understand the five typical wireless security threats
* Discover how network security impacts wireless security, from intrusion protection and detection to host-based security, VPNs, and event correlation
* Get the scoop on wireless security components-WEP and other built-in WLAN features, authentication, encryption, and device placement
* Find out how to integrate wireless into the network security process, from event logging and policies to assessments and change control
* Get detailed advice on implementing specific solutions-LEAP, RADIUS, and an IPSEC VPN client
* Learn how to secure public wireless networks in a café or kiosk and implement secure point-to-point connections for remote or branch offices

Your Hands-on Guide to the Wireless Future

Inside This Book (Learn More)
First Sentence
THERE ARE SEVERAL TYPES OF wireless communication in use today. Read the first page
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Sell a Digital Version of This Book in the Kindle Store

If you are a publisher or author and hold the digital rights to a book, you can sell a digital version of it in our Kindle Store. Learn more

Customer Reviews

4 star
0
3 star
0
2 star
0
1 star
0
5.0 out of 5 stars
5.0 out of 5 stars
Most helpful customer reviews
5.0 out of 5 stars Detailed and Concise Jan. 26 2003
Format:Paperback
I have to admit I was very naive about wireless security, hence the need to educate myself. The problem is there is so much noise out there, misleading, conflicting or confusing information regarding the topic. This was the first book I was able to really walk away from feeling very comfortable that I covered the most important angles.
Right off the bat I was happy to find that it's very "vendor agnostic", not focusing on tools or techniques that are unique to certain commercial systems. The pace of the book is good, first walking you through the basics of wireless network security, then moving into the components of network security then how they relate to wireless networks. It's also nice that they have an entire chapter dedicated to integrating wireless access into an existing network - something most of us are needing to do these days. Lastly, it covers a variety of differing security models. These become very helpful because you can use them as a basis for cumstomizing your own wireless security system.
Overall, if you're a network security professional looking for a good solid foundation in how it pertains to wireless networks, this a great book to have around.
Was this review helpful to you?
Most Helpful Customer Reviews on Amazon.com (beta)
Amazon.com: 5.0 out of 5 stars  1 review
6 of 6 people found the following review helpful
5.0 out of 5 stars Detailed and Concise Jan. 26 2003
By Brandon Davis - Published on Amazon.com
Format:Paperback
I have to admit I was very naive about wireless security, hence the need to educate myself. The problem is there is so much noise out there, misleading, conflicting or confusing information regarding the topic. This was the first book I was able to really walk away from feeling very comfortable that I covered the most important angles.
Right off the bat I was happy to find that it's very "vendor agnostic", not focusing on tools or techniques that are unique to certain commercial systems. The pace of the book is good, first walking you through the basics of wireless network security, then moving into the components of network security then how they relate to wireless networks. It's also nice that they have an entire chapter dedicated to integrating wireless access into an existing network - something most of us are needing to do these days. Lastly, it covers a variety of differing security models. These become very helpful because you can use them as a basis for cumstomizing your own wireless security system.
Overall, if you're a network security professional looking for a good solid foundation in how it pertains to wireless networks, this a great book to have around.
Search Customer Reviews
Only search this product's reviews

Look for similar items by category


Feedback