Only 1 left in stock (more on the way).
Ships from and sold by Gift-wrap available.
802.11 Security has been added to your Cart
+ CDN$ 6.49 shipping
Used: Good | Details
Condition: Used: Good
Comment: Moderate wear on cover and edges. Minimal highlighting and/or other markings can be present. May be ex-library copy and may not include CD, Accessories and/or Dust Cover. Good readable copy.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

802.11 Security Paperback – Dec 27 2002

3.4 out of 5 stars 10 customer reviews

See all 2 formats and editions Hide other formats and editions
Amazon Price
New from Used from
"Please retry"
CDN$ 45.41
CDN$ 12.95 CDN$ 0.23

Unlimited FREE Two-Day Shipping for Six Months When You Try Amazon Student
click to open popover

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Product Details

  • Paperback: 196 pages
  • Publisher: O'Reilly Media; 1 edition (Dec 27 2002)
  • Language: English
  • ISBN-10: 0596002904
  • ISBN-13: 978-0596002909
  • Product Dimensions: 17.8 x 1.2 x 23.3 cm
  • Shipping Weight: 408 g
  • Average Customer Review: 3.4 out of 5 stars 10 customer reviews
  • Amazon Bestsellers Rank: #3,086,235 in Books (See Top 100 in Books)
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

  • See Complete Table of Contents

Product Description

About the Author

is the Manager of Network and Security Operations for VeriSign's Mass Market's division. He manages the security for over a hundred network devices and several hundred servers. He's the founder of the Shmoo Group (, a web site for security, cryptography, and privacy professionals, and NoVAWireless (, a community-based wireless network project in Northern Virginia.

is a security researcher and the Director of Methodology Development at Secure Software, Inc. He has been involved in wireless networking both through the Northern Virginia community wireless group and through commercial security research into the topology of wireless networks. His recent work includes investigation of layer two attacks against wireless networking devices.

Customer Reviews

Top Customer Reviews

Format: Paperback
802.11 Security is another fine O'Reilly book, it is very nicely written and laid out and the message is crystal clear.
The reason I gave it three stars was that the book is heavily biased towards Linux, Free BSD, and Open BSD and the title does not reflect the bias. That is not a bad thing, I found the unix information wonderful, but if you are ordering 802.11 Security over the web, you might easily miss the unix emphasis and end up with a book that doesn't meet your needs.
One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
Format: Paperback
Warning Will Robinson! This small book on 802.11b wireless security (167 pages not including the comprehensive index) is not for the faint of heart. To take full advantage of the copious amount of detail that Potter and Fleck provide, you need a good working knowledge of networking, and familiarity with either the Linux, FreeBSD, or OpenBSD operating systems.
802.11 Security is aimed at people who need to configure and administer secure 802.11b wireless (popularly named Airport or WiFi) networks. 802.11 Security is NOT targeted at the casual home computer user who merely wants to keep others from poaching their wireless connection. Those users are best served by Adam Engst's and Glenn Fleishman's Wireless Internet Starter Kit.
However, if you have any interest in comprehensive and detailed knowledge of how 802.11b security works from the network administrator's viewpoint, 802.11 Security is the book for you. Potter and Fleck have years of experience with Unix security issues, and have several papers on the subject to their credit.
After setting the stage with a good discussion of the many problems with wireless security, the authors outline some of the more common types of attacks on wireless networks. Why? Their point is that understanding the nature of the "Man-in-the-middle" attack (for example) is important for knowing how to prevent it. This point shows that 802.11 Security is more than just a "cookbook" manual. It provides the "why" as well as the "how."
The bulk of the book covers how to configure FreeBSD, Linux, and OpenBSD clients, gateways, and access points (base stations for us Apple types). Plenty of examples are provided.
Read more ›
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
Format: Paperback
I did the smart thing and got this book on inter-library loan BEFORE making a decision whether to purchase it. I noted that the book was only 176 pages long. Word to the wise: If a book on tech stuff is that short, be suspicious of the content. When a tech book is small like this one is, there usually is no "there" there. And when I see that a book this short is cover priced at almost $(Amamzon edited out the cover price, so look for it elsewhere) USD, all kinds of red warning lights begin to flash in my head. Glad I didn't waste the money!
In a word this book is "cursory." I was looking for solutions for a good cross-platform security solution for my wireless LAN. All this book gave me were other places to go for information. For instance, there is a section on IPSec VPN that is a grand total of seven pages long, which has good plans for how to use FreeBSD or Linux servers, but then also refers you to a website for more information. There are a bunch of website references scattered throughout the whole of the book in a "look here for more information" way. If I wanted to reference the web for information, I'd use Google for FREE and not spend almost (cover price) to have someone else tell me where to look.
The author states in the beginning of the book that if you are familiar with FreeBSD and Linux and want to use these for wireless security it's a good book to read. Well, speaking from an admin's standpoint, and having compiled several FreeBSD kernels and setup several Linux boxes, this book is FAR below my experience level. If you are an admin of WinTel boxes, this book is not for you. If you are a Macintosh admin (which I also am), don't bother with this book either.
Read more ›
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
Format: Paperback
I don't agree with the negative reviews above. The book doesn't pretend to be a reference of 802.11 protocols at all. It claims to cover fundamentals of wireless security and practical solutions for many operating systems. And it does hold that promise.
The introduction to wireless security is to the point and accurate.
I can't judge all the OS specific chapters, but those that cover OpenBSD are well done and a good introduction to all tools relevant to 802.11 on that platform.
If you have to think twice before spending [the money], you can find the same information in man pages. That doesn't mean that the book isn't worth its price, though.
Anyone using wireless networks without being aware of the security implications will profit from this short book, and those running one of the covered operating systems will find the examples a good starting point.
It's only 176 pages, and about 80% are OS specific (covering Linux/netfilter, FreeBSD/ipfw, OpenBSD/pf, Mac OSX and Windows), which means you can either skip over most of the OS specific parts or use it as an summary of the similarities and differences among those OSs.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse