Buy Used
CDN$ 2.71
+ CDN$ 6.49 shipping
Used: Good | Details
Sold by Daily-Deal-
Condition: Used: Good
Comment: This Book is in Good Condition. Used Copy With Light Amount of Wear. 100% Guaranteed.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Wireless Security Essentials: Defending Mobile Systems from Data Piracy Paperback – Jul 25 2002

4.7 out of 5 stars 6 customer reviews

See all 4 formats and editions Hide other formats and editions
Amazon Price
New from Used from
"Please retry"
CDN$ 88.54 CDN$ 2.44

FREE Unlimited Cloud Photo Storage When You Try Amazon Student
click to open popover

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Product Details

  • Paperback: 368 pages
  • Publisher: Wiley; 1 edition (July 25 2002)
  • Language: English
  • ISBN-10: 0471209368
  • ISBN-13: 978-0471209362
  • Product Dimensions: 19.3 x 2.1 x 23.3 cm
  • Shipping Weight: 617 g
  • Average Customer Review: 4.7 out of 5 stars 6 customer reviews
  • Amazon Bestsellers Rank: #3,356,212 in Books (See Top 100 in Books)
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

  • See Complete Table of Contents

Product Description

From the Back Cover

Protect your wireless systems from attack with this clear-cut guide on how to implement proven security methodologies

Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation, and an overall lack of privacy. This comprehensive book clearly shows you how to identify these vulnerabilities and protect yourself against them by building security into the network infrastructure and connected devices. Drawing on the latest research in the field, Vines offers a thorough examination of the fundamental concepts of security and basic computing technology. He first provides you with the necessary background on wireless and cellular technologies, looking at the various ways in which they are implemented. You'll then learn about a wide range of security methodologies and find out how to apply them to the wireless world. Finally, you'll confront the security challenges with wireless systems and discover all of the options available to protect your information.

A complete guide to current wireless technologies and standards, security risks, and proven security solutions, Wireless Security Essentials explores:
* Wireless data networking technologies and the wireless application protocol
* Wireless standards and technologies
* Cryptographic technologies and PKI
* Threats to personal electronic devices like Palm Wireless Handhelds, PocketPCs, Internet-enabled cell phones, and BlackBerrys
* WAP security
* Security monitoring and testing
* Hardware and software solutions

About the Author

RUSSELL DEAN VINES is founder and President of The RDV Group Inc., a New York City-based security consulting services firm. His company is active in detecting, preventing, and solving security vulnerabilities for clients in government, finance, and new media organizations. Vines is also a frequent speaker on security issues and coauthor of the bestselling book The CISSP Prep Guide: Mastering the Ten Domains of Computer Security (Wiley).

Customer Reviews

4.7 out of 5 stars
5 star
4 star
3 star
2 star
1 star
See all 6 customer reviews
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback
Writing a book on wireless security is like writing a book on safe skydiving - if you want the safety and security, just don't do it. Hard-wired (cabled) networks have been around for decades and they are still for the most part insecure. Wireless networking (focusing on 802.11), which has been around for only a few years, is clearly an insecure technology. With that, there is currently not a lot to write about when it comes to effective wireless security.
Wireless Security Essentials: Defending Mobile Systems from Data Piracy confirms that there is little to say on this topic because although it is 345 pages in length, only about 75 pages deal with wireless security. Of those 75 pages (pages 135 - 207), about 15 pages discuss vendor products.
The first 135 pages and 4 chapters of the book are an introduction to computer technology, networking, wireless security, and basic security issues. In addition to the 75 pages on wireless security, pages 209 - 345 are composed of a comprehensive glossary and 4 appendixes.
Only in chapter 5 does the book get into " wireless security". For the most part, people equate wireless with 802.11. Within 802.11, the security functionality is provided by WEP (Wired Equivalent Privacy), which provides the underlying security of 802.11. But an insurmountable problem is that WEP has been proven (see Breaking 802.11 Security at [URL]) to be seriously flawed, and is therefore insecure. Since the security foundation of 802.11 is basically nil, 802.11 networks as of this writing simply can't be adequately secured.
So why do companies deploy wireless networks given their inherent security risks? For the same reason they deploy Windows -- functionality.
Read more ›
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
By A Customer on Oct. 18 2002
Format: Paperback
The title may lead you to believe that only wireless security is addressed but this book is a complete source of security information and reference material that is useful for any computer user.
It provides detailed information on security standards and policies. Both for the wireless and connected environments. There is also specific information for the products of major vendors.
The true test of whether or not a technical book is useful is whether or not you can apply the information provided to the real world. After finding an unknown machine attached to my wireless network one day I was glad I had this book handy. It proved an invaluable asset in locking down our system and accessing any damage.
highly recommended for anyone interested in security. Wireless or not.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
Format: Paperback
Two thumbs up! In depth coverage, but easy to read. The fifteen pages of references gives an indication of the extent of research backing this book, not to mention the author's extensive background in computer security. I like the fact that each chapter stands on it's own - You can dive in wherever you like and sink your teeth into it. The well thought-out formatting and illustrations make it a breeze to navigate. Whether you're looking for a guide to wireless security, or for a reference book on the alphabet soup of protocols and standards, this book is the answer!
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse