Wireless Security Essentials and over one million other books are available for Amazon Kindle. Learn more

Vous voulez voir cette page en français ? Cliquez ici.

Have one to sell? Sell yours here
Start reading Wireless Security Essentials on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Wireless Security Essentials: Defending Mobile Systems from Data Piracy [Paperback]

Russell Dean Vines
4.7 out of 5 stars  See all reviews (6 customer reviews)

Available from these sellers.


Formats

Amazon Price New from Used from
Kindle Edition CDN $39.36  
Paperback --  

Book Description

July 25 2002 0471209368 978-0471209362 1
As wireless device usage increases worldwide, so does the potential for malicious code attacks. In this timely book, a leading national authority on wireless security describes security risks inherent in current wireless technologies and standards, and schools readers in proven security measures they can take to minimize the chance of attacks to their systems.
* Russell Dean Vines is the coauthor of the bestselling security certification title, The CISSP Prep Guide (0-471-41356-9)
* Book focuses on identifying and minimizing vulnerabilities by implementing proven security methodologies, and provides readers with a solid working knowledge of wireless technology and Internet-connected mobile devices

Product Details


Product Description

From the Back Cover

Protect your wireless systems from attack with this clear-cut guide on how to implement proven security methodologies

Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation, and an overall lack of privacy. This comprehensive book clearly shows you how to identify these vulnerabilities and protect yourself against them by building security into the network infrastructure and connected devices. Drawing on the latest research in the field, Vines offers a thorough examination of the fundamental concepts of security and basic computing technology. He first provides you with the necessary background on wireless and cellular technologies, looking at the various ways in which they are implemented. You'll then learn about a wide range of security methodologies and find out how to apply them to the wireless world. Finally, you'll confront the security challenges with wireless systems and discover all of the options available to protect your information.

A complete guide to current wireless technologies and standards, security risks, and proven security solutions, Wireless Security Essentials explores:
* Wireless data networking technologies and the wireless application protocol
* Wireless standards and technologies
* Cryptographic technologies and PKI
* Threats to personal electronic devices like Palm Wireless Handhelds, PocketPCs, Internet-enabled cell phones, and BlackBerrys
* WAP security
* Security monitoring and testing
* Hardware and software solutions

About the Author

RUSSELL DEAN VINES is founder and President of The RDV Group Inc., a New York City-based security consulting services firm. His company is active in detecting, preventing, and solving security vulnerabilities for clients in government, finance, and new media organizations. Vines is also a frequent speaker on security issues and coauthor of the bestselling book The CISSP Prep Guide: Mastering the Ten Domains of Computer Security (Wiley).

Inside This Book (Learn More)
First Sentence
To understand how wireless networking works, you first need to understand the basic elements of computer hardware, software, and networking. Read the first page
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Customer Reviews

4 star
0
2 star
0
1 star
0
4.7 out of 5 stars
4.7 out of 5 stars
Most helpful customer reviews
5.0 out of 5 stars Useful when it counted. Oct. 18 2002
By A Customer
Format:Paperback
The title may lead you to believe that only wireless security is addressed but this book is a complete source of security information and reference material that is useful for any computer user.
It provides detailed information on security standards and policies. Both for the wireless and connected environments. There is also specific information for the products of major vendors.
The true test of whether or not a technical book is useful is whether or not you can apply the information provided to the real world. After finding an unknown machine attached to my wireless network one day I was glad I had this book handy. It proved an invaluable asset in locking down our system and accessing any damage.
highly recommended for anyone interested in security. Wireless or not.
Was this review helpful to you?
5.0 out of 5 stars Another Winner Sept. 10 2002
By A Customer
Format:Paperback
If you think the only thing you need to do to ensure wireless security is not leaving your cell phone lying around, you should check this book out. I went right to this book, mostly because of the author, and it did not disappoint. His CISSP Prep Guide is also an amazing book.
Was this review helpful to you?
Format:Paperback
Writing a book on wireless security is like writing a book on safe skydiving - if you want the safety and security, just don't do it. Hard-wired (cabled) networks have been around for decades and they are still for the most part insecure. Wireless networking (focusing on 802.11), which has been around for only a few years, is clearly an insecure technology. With that, there is currently not a lot to write about when it comes to effective wireless security.
Wireless Security Essentials: Defending Mobile Systems from Data Piracy confirms that there is little to say on this topic because although it is 345 pages in length, only about 75 pages deal with wireless security. Of those 75 pages (pages 135 - 207), about 15 pages discuss vendor products.
The first 135 pages and 4 chapters of the book are an introduction to computer technology, networking, wireless security, and basic security issues. In addition to the 75 pages on wireless security, pages 209 - 345 are composed of a comprehensive glossary and 4 appendixes.
Only in chapter 5 does the book get into " wireless security". For the most part, people equate wireless with 802.11. Within 802.11, the security functionality is provided by WEP (Wired Equivalent Privacy), which provides the underlying security of 802.11. But an insurmountable problem is that WEP has been proven (see Breaking 802.11 Security at [URL]) to be seriously flawed, and is therefore insecure. Since the security foundation of 802.11 is basically nil, 802.11 networks as of this writing simply can't be adequately secured.
So why do companies deploy wireless networks given their inherent security risks? For the same reason they deploy Windows -- functionality.
Read more ›
Was this review helpful to you?
Want to see more reviews on this item?
ARRAY(0xb100248c)

Look for similar items by category


Feedback