• List Price: CDN$ 45.37
  • You Save: CDN$ 13.26 (29%)
Only 1 left in stock (more on the way).
Ships from and sold by Amazon.ca. Gift-wrap available.
802.11 Security has been added to your Cart
+ CDN$ 6.49 shipping
Used: Like New | Details
Condition: Used: Like New
Comment: Ships from the USA. Please allow 14-21 business days for delivery. Excellent condition with minimal visible wear. Biggest little used bookstore in the world.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

802.11 Security Paperback – Dec 27 2002

3.4 out of 5 stars 10 customer reviews

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
"Please retry"
CDN$ 32.11
CDN$ 12.95 CDN$ 0.01

Harry Potter and the Cursed Child
click to open popover

Special Offers and Product Promotions

  • You'll save an extra 5% on Books purchased from Amazon.ca, now through July 29th. No code necessary, discount applied at checkout. Here's how (restrictions apply)

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Product Details

  • Paperback: 196 pages
  • Publisher: O'Reilly Media; 1 edition (Dec 27 2002)
  • Language: English
  • ISBN-10: 0596002904
  • ISBN-13: 978-0596002909
  • Product Dimensions: 17.8 x 1.2 x 23.3 cm
  • Shipping Weight: 408 g
  • Average Customer Review: 3.4 out of 5 stars 10 customer reviews
  • Amazon Bestsellers Rank: #2,955,377 in Books (See Top 100 in Books)
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

  • See Complete Table of Contents

Product Description

About the Author

is the Manager of Network and Security Operations for VeriSign's Mass Market's division. He manages the security for over a hundred network devices and several hundred servers. He's the founder of the Shmoo Group (www.shmoo.com), a web site for security, cryptography, and privacy professionals, and NoVAWireless (www.novawireless.org), a community-based wireless network project in Northern Virginia.

is a security researcher and the Director of Methodology Development at Secure Software, Inc. He has been involved in wireless networking both through the Northern Virginia community wireless group and through commercial security research into the topology of wireless networks. His recent work includes investigation of layer two attacks against wireless networking devices.

Customer Reviews

Top Customer Reviews

Format: Paperback
802.11 Security is another fine O'Reilly book, it is very nicely written and laid out and the message is crystal clear.
The reason I gave it three stars was that the book is heavily biased towards Linux, Free BSD, and Open BSD and the title does not reflect the bias. That is not a bad thing, I found the unix information wonderful, but if you are ordering 802.11 Security over the web, you might easily miss the unix emphasis and end up with a book that doesn't meet your needs.
One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
Format: Paperback
You've got one, I've got one, we've all got one. Wired networks have become so passe` now that wireless networks are everywhere. The one characteristic of most wireless networks is the lack of security. Enter O'Reilly's 802.11 Security.
Potter and Fleck have written this little book as a no-nonsense guide to understanding the problem of wireless networking security. They also do an excellent job demonstrating how to implement solutions that are quick, simple and actually work.
Overall, I would have to say that this book is a gold mine for anyone running an 802.11 network. It has helped me figure out how to implement wireless networking at home thus minimizing security risks. As usual the book is very easy reading and it's written in a very easy-going style giving the necessary background before launching into any detailed discussions. I would highly recommend this book to anyone considering or using a wireless network.
Even though given enough time my wireless network could be sniffed out, I feel much better having a better understanding of how important securing my wireless network is and knowing that I've done what I can to prevent unauthorized use.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
Format: Paperback
I did the smart thing and got this book on inter-library loan BEFORE making a decision whether to purchase it. I noted that the book was only 176 pages long. Word to the wise: If a book on tech stuff is that short, be suspicious of the content. When a tech book is small like this one is, there usually is no "there" there. And when I see that a book this short is cover priced at almost $(Amamzon edited out the cover price, so look for it elsewhere) USD, all kinds of red warning lights begin to flash in my head. Glad I didn't waste the money!
In a word this book is "cursory." I was looking for solutions for a good cross-platform security solution for my wireless LAN. All this book gave me were other places to go for information. For instance, there is a section on IPSec VPN that is a grand total of seven pages long, which has good plans for how to use FreeBSD or Linux servers, but then also refers you to a website for more information. There are a bunch of website references scattered throughout the whole of the book in a "look here for more information" way. If I wanted to reference the web for information, I'd use Google for FREE and not spend almost (cover price) to have someone else tell me where to look.
The author states in the beginning of the book that if you are familiar with FreeBSD and Linux and want to use these for wireless security it's a good book to read. Well, speaking from an admin's standpoint, and having compiled several FreeBSD kernels and setup several Linux boxes, this book is FAR below my experience level. If you are an admin of WinTel boxes, this book is not for you. If you are a Macintosh admin (which I also am), don't bother with this book either.
Read more ›
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
Format: Paperback
Warning Will Robinson! This small book on 802.11b wireless security (167 pages not including the comprehensive index) is not for the faint of heart. To take full advantage of the copious amount of detail that Potter and Fleck provide, you need a good working knowledge of networking, and familiarity with either the Linux, FreeBSD, or OpenBSD operating systems.
802.11 Security is aimed at people who need to configure and administer secure 802.11b wireless (popularly named Airport or WiFi) networks. 802.11 Security is NOT targeted at the casual home computer user who merely wants to keep others from poaching their wireless connection. Those users are best served by Adam Engst's and Glenn Fleishman's Wireless Internet Starter Kit.
However, if you have any interest in comprehensive and detailed knowledge of how 802.11b security works from the network administrator's viewpoint, 802.11 Security is the book for you. Potter and Fleck have years of experience with Unix security issues, and have several papers on the subject to their credit.
After setting the stage with a good discussion of the many problems with wireless security, the authors outline some of the more common types of attacks on wireless networks. Why? Their point is that understanding the nature of the "Man-in-the-middle" attack (for example) is important for knowing how to prevent it. This point shows that 802.11 Security is more than just a "cookbook" manual. It provides the "why" as well as the "how."
The bulk of the book covers how to configure FreeBSD, Linux, and OpenBSD clients, gateways, and access points (base stations for us Apple types). Plenty of examples are provided.
Read more ›
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse

Most recent customer reviews