Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Security

Buy
Wireless Security, 9780072222869 (0072222867), McGraw-Hill, 2002
Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless security.

Protect your network and applications from wireless threats using information from the leading e-security authority

Reduce the risk of security breaches and keep your wireless communications safe with help from this comprehensive guide. Written in conjunction with wireless security experts, this authoritative resource provides you with a clear background of how wireless technology works worldwide, explains current key security protocols, shows you how to deploy a wireless LAN, and much more. You'll understand the full range of wireless network vulnerabilities and learn the characteristics of specific threats such as eavesdropping and wireless denial of service attacks. You'll also discover how to securely access business applications from wireless devices, gain real-world knowledge through numerous detailed wireless implementations, and preview emerging technologies including 3G.

This book will show you how to:

  • Identify the various layers of wireless network protocols--physical, network, and application layers
  • Learn the differences in wireless technologies around the globe
  • Comprehend major security protocols including SSL, WTLS, 802.1x, and IPSec
  • Recognize the vulnerabilities in today's wireless technologies and take steps to prevent against threats
  • Alleviate data security risks associated with PDAs, cellular handsets, and other wireless devices
  • Familiarize yourself with long-, medium-, and short-range wireless data networks and emerging standards
  • Assess which cryptography method is best for accessing corporate applications from wireless devices
  • Build a successful wireless security infrastructure using existing technologies

Safeguard your network using this definitive guide to wireless security.

About the Author

Merritt Maxim has more than 4 years' experience in the information security industry, most recently as a product manager for wireless security at RSA Security in Bedford, MA. In that role, Merritt was responsible for defining RSA's cross-product line wireless architecture and spoke at numerous industry events on wireless security topics. Previously, Merritt was a senior research analyst at MIT. David Pollino is a senior security consultant at @stake, Inc. He has extensive networking experience, including working for a tier 1 ISP, architecting and deploying secure networks for Fortune 500 companies. David leads the @stake Center of Excellence focusing on wireless technologies such as 802.11x, WAP and GPRS. Recent projects include helping design and oversee the security architecture for a large European ASP and assisting with the security architecture for a wireless provider.

(HTML tags aren't allowed.)

The Proximity Principle: The Proven Strategy That Will Lead to a Career You Love
The Proximity Principle: The Proven Strategy That Will Lead to a Career You Love

Right now, 70% of Americans aren’t passionate about their work and are desperately longing for meaning and purpose. They’re sick of “average” and know there’s something better out there, but they just don’t know how to reach it.

One basic principle?The Proximity Principle?can change...

Adventures in Criminology
Adventures in Criminology
[The book] is one of great distinction, scholarship and wit. ...a pleasure to read and which, itself, is a primary source of evidence from which much can be learnt.
Punishment and Society

Sir Leon Radzinowicz is one of the key figures in the development of criminology in the twentieth century....

Securing the Internet of Things
Securing the Internet of Things

Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues...


Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
"If you’re even thinking of doing any security engineering, you need to read this book. It’s the first, and only, end-to-end modern security design and engineering book ever written."–Bruce Schneier

"Many people are anxious about Internet security for PCs and servers," says leading expert Ross Anderson,...

Adobe Photoshop Elements 7 Maximum Performance: Unleash the hidden performance of Elements
Adobe Photoshop Elements 7 Maximum Performance: Unleash the hidden performance of Elements

In this unique book and DVD package, Mark Galer shows you how to unleash the hidden potential of Adobe Photoshop Elements 7 for professional-quality image editing without the need to upgrade to the full version of Photoshop. Using real-world projects presented in step-by-step tutorials, this guide to Elements' less-known and most powerful...

C+ + for Programmers (Deitel Developer Series)
C+ + for Programmers (Deitel Developer Series)
The professional programmer’s DEITEL® guide to C++ and object-oriented application development

Written for programmers with a background in high-level language programming, this book applies the Deitel signature live-code approach to teaching programming and explores the C++ language and C++ Standard
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy