- You'll save an extra 5% on Books purchased from Amazon.ca, now through July 29th. No code necessary, discount applied at checkout. Here's how (restrictions apply)
802.11 Security Paperback – Dec 27 2002
Special Offers and Product Promotions
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.
To get the free app, enter your mobile phone number.
About the Author
is the Manager of Network and Security Operations for VeriSign's Mass Market's division. He manages the security for over a hundred network devices and several hundred servers. He's the founder of the Shmoo Group (www.shmoo.com), a web site for security, cryptography, and privacy professionals, and NoVAWireless (www.novawireless.org), a community-based wireless network project in Northern Virginia.
is a security researcher and the Director of Methodology Development at Secure Software, Inc. He has been involved in wireless networking both through the Northern Virginia community wireless group and through commercial security research into the topology of wireless networks. His recent work includes investigation of layer two attacks against wireless networking devices.
Top Customer Reviews
The reason I gave it three stars was that the book is heavily biased towards Linux, Free BSD, and Open BSD and the title does not reflect the bias. That is not a bad thing, I found the unix information wonderful, but if you are ordering 802.11 Security over the web, you might easily miss the unix emphasis and end up with a book that doesn't meet your needs.
Potter and Fleck have written this little book as a no-nonsense guide to understanding the problem of wireless networking security. They also do an excellent job demonstrating how to implement solutions that are quick, simple and actually work.
Overall, I would have to say that this book is a gold mine for anyone running an 802.11 network. It has helped me figure out how to implement wireless networking at home thus minimizing security risks. As usual the book is very easy reading and it's written in a very easy-going style giving the necessary background before launching into any detailed discussions. I would highly recommend this book to anyone considering or using a wireless network.
Even though given enough time my wireless network could be sniffed out, I feel much better having a better understanding of how important securing my wireless network is and knowing that I've done what I can to prevent unauthorized use.
In a word this book is "cursory." I was looking for solutions for a good cross-platform security solution for my wireless LAN. All this book gave me were other places to go for information. For instance, there is a section on IPSec VPN that is a grand total of seven pages long, which has good plans for how to use FreeBSD or Linux servers, but then also refers you to a website for more information. There are a bunch of website references scattered throughout the whole of the book in a "look here for more information" way. If I wanted to reference the web for information, I'd use Google for FREE and not spend almost (cover price) to have someone else tell me where to look.
The author states in the beginning of the book that if you are familiar with FreeBSD and Linux and want to use these for wireless security it's a good book to read. Well, speaking from an admin's standpoint, and having compiled several FreeBSD kernels and setup several Linux boxes, this book is FAR below my experience level. If you are an admin of WinTel boxes, this book is not for you. If you are a Macintosh admin (which I also am), don't bother with this book either.Read more ›
Warning Will Robinson! This small book on 802.11b wireless security (167 pages not including the comprehensive index) is not for the faint of heart. To take full advantage of the copious amount of detail that Potter and Fleck provide, you need a good working knowledge of networking, and familiarity with either the Linux, FreeBSD, or OpenBSD operating systems.
802.11 Security is aimed at people who need to configure and administer secure 802.11b wireless (popularly named Airport or WiFi) networks. 802.11 Security is NOT targeted at the casual home computer user who merely wants to keep others from poaching their wireless connection. Those users are best served by Adam Engst's and Glenn Fleishman's Wireless Internet Starter Kit.
However, if you have any interest in comprehensive and detailed knowledge of how 802.11b security works from the network administrator's viewpoint, 802.11 Security is the book for you. Potter and Fleck have years of experience with Unix security issues, and have several papers on the subject to their credit.
After setting the stage with a good discussion of the many problems with wireless security, the authors outline some of the more common types of attacks on wireless networks. Why? Their point is that understanding the nature of the "Man-in-the-middle" attack (for example) is important for knowing how to prevent it. This point shows that 802.11 Security is more than just a "cookbook" manual. It provides the "why" as well as the "how."
The bulk of the book covers how to configure FreeBSD, Linux, and OpenBSD clients, gateways, and access points (base stations for us Apple types). Plenty of examples are provided.Read more ›
Most recent customer reviews
I disagree with the other reviewer. While it's true that this book has a large collection of URL's that *could* be found using a search engine, the fact that the authors took the... Read morePublished on June 20 2003 by Jim W Jerzycke
Wow, I can't believe this book has any less than 4.5 stars. The 1-star reviews really do seem to miss the mark. Read morePublished on March 3 2003
You don't know me. So you are not supposed to trust me blindly.
However, after years in this (security) area, let me share a thought with you: It is not the music, but who and... Read more
I don't agree with the negative reviews above. The book doesn't pretend to be a reference of 802.11 protocols at all. Read morePublished on Feb. 7 2003 by dhartmei
This book is a general network security book that masquerades as a reference on wireless LANs. Much of the book is general information that applies to any network, and is not... Read morePublished on Jan. 16 2003
Look for similar items by category
- Books > Computers & Technology > Certification Central > Exams > Security+
- Books > Computers & Technology > Networking & Cloud Computing > Network Security
- Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs > LAN
- Books > Computers & Technology > Networking & Cloud Computing > Wireless Networks
- Books > Computers & Technology > Programming > APIs & Operating Environments > Palm OS
- Books > Textbooks > Computer Science & Information Systems > Networking