Wireless Security Essentials: Defending Mobile Systems from Data Piracy Paperback – Jul 25 2002
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.
To get the free app, enter your mobile phone number.
From the Back Cover
Protect your wireless systems from attack with this clear-cut guide on how to implement proven security methodologies
Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation, and an overall lack of privacy. This comprehensive book clearly shows you how to identify these vulnerabilities and protect yourself against them by building security into the network infrastructure and connected devices. Drawing on the latest research in the field, Vines offers a thorough examination of the fundamental concepts of security and basic computing technology. He first provides you with the necessary background on wireless and cellular technologies, looking at the various ways in which they are implemented. You'll then learn about a wide range of security methodologies and find out how to apply them to the wireless world. Finally, you'll confront the security challenges with wireless systems and discover all of the options available to protect your information.
A complete guide to current wireless technologies and standards, security risks, and proven security solutions, Wireless Security Essentials explores:
* Wireless data networking technologies and the wireless application protocol
* Wireless standards and technologies
* Cryptographic technologies and PKI
* Threats to personal electronic devices like Palm Wireless Handhelds, PocketPCs, Internet-enabled cell phones, and BlackBerrys
* WAP security
* Security monitoring and testing
* Hardware and software solutions
About the Author
RUSSELL DEAN VINES is founder and President of The RDV Group Inc., a New York City-based security consulting services firm. His company is active in detecting, preventing, and solving security vulnerabilities for clients in government, finance, and new media organizations. Vines is also a frequent speaker on security issues and coauthor of the bestselling book The CISSP Prep Guide: Mastering the Ten Domains of Computer Security (Wiley).
Top Customer Reviews
Wireless Security Essentials: Defending Mobile Systems from Data Piracy confirms that there is little to say on this topic because although it is 345 pages in length, only about 75 pages deal with wireless security. Of those 75 pages (pages 135 - 207), about 15 pages discuss vendor products.
The first 135 pages and 4 chapters of the book are an introduction to computer technology, networking, wireless security, and basic security issues. In addition to the 75 pages on wireless security, pages 209 - 345 are composed of a comprehensive glossary and 4 appendixes.
Only in chapter 5 does the book get into " wireless security". For the most part, people equate wireless with 802.11. Within 802.11, the security functionality is provided by WEP (Wired Equivalent Privacy), which provides the underlying security of 802.11. But an insurmountable problem is that WEP has been proven (see Breaking 802.11 Security at [URL]) to be seriously flawed, and is therefore insecure. Since the security foundation of 802.11 is basically nil, 802.11 networks as of this writing simply can't be adequately secured.
So why do companies deploy wireless networks given their inherent security risks? For the same reason they deploy Windows -- functionality.Read more ›
It provides detailed information on security standards and policies. Both for the wireless and connected environments. There is also specific information for the products of major vendors.
The true test of whether or not a technical book is useful is whether or not you can apply the information provided to the real world. After finding an unknown machine attached to my wireless network one day I was glad I had this book handy. It proved an invaluable asset in locking down our system and accessing any damage.
highly recommended for anyone interested in security. Wireless or not.
Most recent customer reviews
If you think the only thing you need to do to ensure wireless security is not leaving your cell phone lying around, you should check this book out. Read morePublished on Sept. 10 2002
I found that this book was informative in explaining the different wireless protocols out there. It also explained some of the weaknesses, which helped me not only to set up my... Read morePublished on Aug. 5 2002
Look for similar items by category
- Books > Business & Investing > Industries & Professions > E-commerce
- Books > Computers & Technology > Certification Central > Exams > Security+
- Books > Computers & Technology > Networking & Cloud Computing > Network Security
- Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs
- Books > Computers & Technology > Networking & Cloud Computing > Wireless Networks
- Books > Computers & Technology > Programming
- Books > Computers & Technology > Software
- Books > Computers & Technology > Web Development > Security & Encryption > Encryption
- Books > Professional & Technical > Engineering > Electrical & Electronics > Electricity Principles
- Books > Professional & Technical > Engineering > Telecommunications > Radio & Wireless
- Books > Textbooks > Computer Science & Information Systems > Networking