Wireless Security Essentials and over one million other books are available for Amazon Kindle. Learn more
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Wireless Security Essentials: Defending Mobile Systems from Data Piracy Paperback – Jul 25 2002


Amazon Price New from Used from
Kindle Edition
"Please retry"
Paperback
"Please retry"
CDN$ 34.39 CDN$ 1.03

Join Amazon Student in Canada


NO_CONTENT_IN_FEATURE

Product Details

  • Paperback: 368 pages
  • Publisher: Wiley; 1 edition (July 25 2002)
  • Language: English
  • ISBN-10: 0471209368
  • ISBN-13: 978-0471209362
  • Product Dimensions: 2.1 x 18.8 x 23 cm
  • Shipping Weight: 617 g
  • Average Customer Review: 4.7 out of 5 stars  See all reviews (6 customer reviews)
  • Amazon Bestsellers Rank: #2,440,124 in Books (See Top 100 in Books)
  • See Complete Table of Contents


Inside This Book (Learn More)
First Sentence
To understand how wireless networking works, you first need to understand the basic elements of computer hardware, software, and networking. Read the first page
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Customer Reviews

4.7 out of 5 stars
5 star
5
4 star
0
3 star
1
2 star
0
1 star
0
See all 6 customer reviews
Share your thoughts with other customers

Most helpful customer reviews

By A Customer on Oct. 18 2002
Format: Paperback
The title may lead you to believe that only wireless security is addressed but this book is a complete source of security information and reference material that is useful for any computer user.
It provides detailed information on security standards and policies. Both for the wireless and connected environments. There is also specific information for the products of major vendors.
The true test of whether or not a technical book is useful is whether or not you can apply the information provided to the real world. After finding an unknown machine attached to my wireless network one day I was glad I had this book handy. It proved an invaluable asset in locking down our system and accessing any damage.
highly recommended for anyone interested in security. Wireless or not.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
By A Customer on Sept. 10 2002
Format: Paperback
If you think the only thing you need to do to ensure wireless security is not leaving your cell phone lying around, you should check this book out. I went right to this book, mostly because of the author, and it did not disappoint. His CISSP Prep Guide is also an amazing book.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
Format: Paperback
Writing a book on wireless security is like writing a book on safe skydiving - if you want the safety and security, just don't do it. Hard-wired (cabled) networks have been around for decades and they are still for the most part insecure. Wireless networking (focusing on 802.11), which has been around for only a few years, is clearly an insecure technology. With that, there is currently not a lot to write about when it comes to effective wireless security.
Wireless Security Essentials: Defending Mobile Systems from Data Piracy confirms that there is little to say on this topic because although it is 345 pages in length, only about 75 pages deal with wireless security. Of those 75 pages (pages 135 - 207), about 15 pages discuss vendor products.
The first 135 pages and 4 chapters of the book are an introduction to computer technology, networking, wireless security, and basic security issues. In addition to the 75 pages on wireless security, pages 209 - 345 are composed of a comprehensive glossary and 4 appendixes.
Only in chapter 5 does the book get into " wireless security". For the most part, people equate wireless with 802.11. Within 802.11, the security functionality is provided by WEP (Wired Equivalent Privacy), which provides the underlying security of 802.11. But an insurmountable problem is that WEP has been proven (see Breaking 802.11 Security at [URL]) to be seriously flawed, and is therefore insecure. Since the security foundation of 802.11 is basically nil, 802.11 networks as of this writing simply can't be adequately secured.
So why do companies deploy wireless networks given their inherent security risks? For the same reason they deploy Windows -- functionality.
Read more ›
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.