Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Security

Buy
Wireless Security, 9780072222869 (0072222867), McGraw-Hill, 2002
Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless security.

Protect your network and applications from wireless threats using information from the leading e-security authority

Reduce the risk of security breaches and keep your wireless communications safe with help from this comprehensive guide. Written in conjunction with wireless security experts, this authoritative resource provides you with a clear background of how wireless technology works worldwide, explains current key security protocols, shows you how to deploy a wireless LAN, and much more. You'll understand the full range of wireless network vulnerabilities and learn the characteristics of specific threats such as eavesdropping and wireless denial of service attacks. You'll also discover how to securely access business applications from wireless devices, gain real-world knowledge through numerous detailed wireless implementations, and preview emerging technologies including 3G.

This book will show you how to:

  • Identify the various layers of wireless network protocols--physical, network, and application layers
  • Learn the differences in wireless technologies around the globe
  • Comprehend major security protocols including SSL, WTLS, 802.1x, and IPSec
  • Recognize the vulnerabilities in today's wireless technologies and take steps to prevent against threats
  • Alleviate data security risks associated with PDAs, cellular handsets, and other wireless devices
  • Familiarize yourself with long-, medium-, and short-range wireless data networks and emerging standards
  • Assess which cryptography method is best for accessing corporate applications from wireless devices
  • Build a successful wireless security infrastructure using existing technologies

Safeguard your network using this definitive guide to wireless security.

About the Author

Merritt Maxim has more than 4 years' experience in the information security industry, most recently as a product manager for wireless security at RSA Security in Bedford, MA. In that role, Merritt was responsible for defining RSA's cross-product line wireless architecture and spoke at numerous industry events on wireless security topics. Previously, Merritt was a senior research analyst at MIT. David Pollino is a senior security consultant at @stake, Inc. He has extensive networking experience, including working for a tier 1 ISP, architecting and deploying secure networks for Fortune 500 companies. David leads the @stake Center of Excellence focusing on wireless technologies such as 802.11x, WAP and GPRS. Recent projects include helping design and oversee the security architecture for a large European ASP and assisting with the security architecture for a wireless provider.

(HTML tags aren't allowed.)

.NET Game Programming with DirectX 9.0
.NET Game Programming with DirectX 9.0
.net Game Programming with DirectX 9.0 is a cool book that gets you up to speed fast on your own game projects. Balanced and complete, .net Game Programming with DirectX 9.0 is aimed toward beginners and advanced programmers alike. The first book to cover the Managed DirectX 9.0 interfaces, from Direct3D to DirectPlay, .net Game Programming with...
Learning ExtJS - Fourth Edition
Learning ExtJS - Fourth Edition

Create powerful web applications with the new and improved Ext JS 5 library

About This Book

  • Explore the essentials of application development in Ext JS 5 and work on real-world web applications
  • Discover the new features of Ext JS 5 such as MVVM (Model-View-ViewModel) and data binding and...
Swift Recipes: A Problem-Solution Approach
Swift Recipes: A Problem-Solution Approach

Swift Recipes provides a problem solution approach for dealing with key aspects of the Swift programming language (covering version 1.2), ensuring you have the indispensable reference you need to successfully execute common programming tasks. You’ll learn how to use the unique features of the Swift programming language as well...


Spaces, Spatiality and Technology (Computer Supported Cooperative Work)
Spaces, Spatiality and Technology (Computer Supported Cooperative Work)
What are the concerns of those who investigate spatiality across domains and across media? What is significant in these concerns - particularly for the design and evaluation of technology? How are these concerns represented? Can discourse from one domain inform work in another?

These are some of the questions addressed in this volume. It is...

Biodegradable Polymer-Based Scaffolds for Bone Tissue Engineering (SpringerBriefs in Applied Sciences and Technology)
Biodegradable Polymer-Based Scaffolds for Bone Tissue Engineering (SpringerBriefs in Applied Sciences and Technology)

This book addresses the principles, methods and applications of biodegradable polymer based scaffolds for bone tissue engineering. The general principle of bone tissue engineering is reviewed and the traditional and novel scaffolding materials, their properties and scaffold fabrication techniques are explored. By acting as temporary synthetic...

The Business Value of Developer Relations: How and Why Technical Communities Are Key To Your Success
The Business Value of Developer Relations: How and Why Technical Communities Are Key To Your Success

Discover the true value of Developer Relations as you learn to build and maintain positive relationships with your developer community. Use the principles laid out in this book to walk through your company goals and discover how you can formulate a plan tailored to your specific needs.

First you will understand the value...

©2020 LearnIT (support@pdfchm.net) - Privacy Policy