Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Security: Know It All

Buy
Wireless Security: Know It All, 9781856175296 (1856175294), Newnes, 2008
The latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!

A 360-degree view from our best-selling authors

Hot topics covered

The ultimate hard-working desk reference; all the essential information, techniques and tricks of the trade in one volume

About the Author

Alan Bensky, MScEE, an electronics engineering consultant with over 25 years of experience in analog and digital design, management, and marketing. Specializing in wireless circuits and systems, Bensky has carried out projects for varied military and consumer applications. He is the author of Short-range Wireless Communication, Second Edition, published by Elsevier, 2004, and has written several articles in international and local publications. He has taught courses and gives lectures on radio engineering topics. Bensky is a senior member of IEEE.

Tony Bradley (CISSP-ISSAP) is the Guide for the Internet/Network Security site on About.com, a part of The New York Times Company. He has written for a variety of other Web sites and publications, including BizTech Magazine, PC World, SearchSecurity.com, WindowsNetworking.com, Smart Computing magazine, and Information Security magazine.
Tony is a CISSP (Certified Information Systems Security Professional) and ISSAP (Information Systems Security Architecture Professional). He is Microsoft Certified as an MCSE (Microsoft Certified Systems Engineer) and MCSA (Microsoft Certified Systems Administrator) in Windows 2000 and an MCP (Microsoft Certified Professional) in Windows NT. Tony is recognized by Microsoft as an MVP (Most Valuable Professional) in Windows security.
On his About.com site, Tony has on average over 600,000 page views per month and over 30,000 subscribers to his weekly newsletter. Tony was also author of Essential Computer Security: Everyones Guide to E-mail, Internet, and Wireless Security (ISBN: 1597491144).

Chris Hurley is a Senior Penetration Tester in the Washington, DC area. He has more than 10 years of experience performing penetration testing, vulnerability assessments, and general INFOSEC grunt work. He is the founder of the WorldWide WarDrive, a four-year project to assess the security posture of wireless networks deployed throughout the world. Chris was also the original organizer of the DEF CON WarDriving contest. He is the lead author of WarDriving: Drive, Detect, Defend (Syngress Publishing, ISBN: 19318360305). He has contributed to several other Syngress publications, including Penetration Tester's Open Source Toolkit (ISBN: 1-5974490210), Stealing the Network: How to Own an Identity (ISBN: 1597490067), InfoSec Career Hacking (ISBN: 1597490113), and OS X for Hackers at Heart (ISBN: 1597490407). He has a BS from Angelo State University in Computer Science and a whole bunch of certifications to make himself feel important.

Dr. Steve Rackley has over 30 years of experience of various aspects of the IT industry, starting in the era of punched cards and IBM mainframes in the 1970s. He soldered together and machine code programmed his first microcomputer while researching laser physics at The Cavendish Laboratory in Cambridge, and has been programming computers ever since. Most recently he has been eBusiness Manager for a UK based multi-national, managing projects to implement new Information Technologies, including the Internet, Web-services, Enterprise Portals, and Wireless Networks.

John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliabiltiy and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup.

James F. Ransome, Ph.D., CISSP, CISM, has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph.D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disci

(HTML tags aren't allowed.)

Computational Methods in Chemical Engineering with Maple
Computational Methods in Chemical Engineering with Maple

This book helps chemical and other engineers develop their skills for solving mathematical models using Maple. These mathematical models can consist of systems of algebraic, ordinary, and partial differential equations. Maple’s ‘dsolve’ is used to obtain solutions for many of these models. Maple worksheets are provided on the...

Beginning Web Programming with HTML, XHTML, and CSS
Beginning Web Programming with HTML, XHTML, and CSS
This beginning guide reviews HTML and also introduces you to using XHTML for the structure of a web page and cascading style sheets (CSS) for controlling how a document should appear on a web page. Youll learn how to take advantage of the latest features of browsers while making sure that your pages still work in older, but popular, browsers. By...
The Network Society: Social Aspects of New Media
The Network Society: Social Aspects of New Media
The last three decades have witnessed a dramatic acceleration in the use, demand, and need for telecommunications, data communication, and mass communication transmitted and integrated into networks. Through a synthesis of contemporary theories about modernization, this book offers a broad-ranging introduction to the 'network' society in all its...

Practical LEGO Technics: Bring Your LEGO Creations to Life (Technology in Action)
Practical LEGO Technics: Bring Your LEGO Creations to Life (Technology in Action)

You already know you can create amazing things with LEGO, but did you know you can also make vehicles that roll and model plans that include landing gear and flaps that actually extend and retract? You can even make functional robots without getting into Mindstorms and programming. In Practical LEGO Technics, Mark...

Apache Geronimo 2.1: Quick Reference
Apache Geronimo 2.1: Quick Reference
Apache Geronimo is a robust, scalable, secure, and high-performing application server. But like all application servers, this power comes with a steep learning curve. This book can help you save your time and get working with Geronimo in matter of a few hours.

This book is a quick-reference guide to Apache Geronimo that mitigates the...

Hudson 3 Essentials
Hudson 3 Essentials

Here is a book that makes life easier for Java developers or administrators by teaching you how to automate application testing using Hudson 3. Fast-paced and hands-on, the guide covers everything from installation to writing plugins.

Overview

  • A practical guide that will teach you how to deploy Hudson 3...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy