Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless security.
Protect your network and applications from wireless threats using information from the leading e-security authority
Reduce the risk of security breaches and keep your wireless communications safe with help from this comprehensive guide. Written in conjunction with wireless security experts, this authoritative resource provides you with a clear background of how wireless technology works worldwide, explains current key security protocols, shows you how to deploy a wireless LAN, and much more. You'll understand the full range of wireless network vulnerabilities and learn the characteristics of specific threats such as eavesdropping and wireless denial of service attacks. You'll also discover how to securely access business applications from wireless devices, gain real-world knowledge through numerous detailed wireless implementations, and preview emerging technologies including 3G.
This book will show you how to:
- Identify the various layers of wireless network protocols--physical, network, and application layers
- Learn the differences in wireless technologies around the globe
- Comprehend major security protocols including SSL, WTLS, 802.1x, and IPSec
- Recognize the vulnerabilities in today's wireless technologies and take steps to prevent against threats
- Alleviate data security risks associated with PDAs, cellular handsets, and other wireless devices
- Familiarize yourself with long-, medium-, and short-range wireless data networks and emerging standards
- Assess which cryptography method is best for accessing corporate applications from wireless devices
- Build a successful wireless security infrastructure using existing technologies
Safeguard your network using this definitive guide to wireless security.
About the Author
Merritt Maxim has more than 4 years' experience in the information security industry, most recently as a product manager for wireless security at RSA Security in Bedford, MA. In that role, Merritt was responsible for defining RSA's cross-product line wireless architecture and spoke at numerous industry events on wireless security topics. Previously, Merritt was a senior research analyst at MIT. David Pollino is a senior security consultant at @stake, Inc. He has extensive networking experience, including working for a tier 1 ISP, architecting and deploying secure networks for Fortune 500 companies. David leads the @stake Center of Excellence focusing on wireless technologies such as 802.11x, WAP and GPRS. Recent projects include helping design and oversee the security architecture for a large European ASP and assisting with the security architecture for a wireless provider.
The Enterprise and Scrum
This book is for those who want to use Scrum throughout their enterprise for product development. Right now, you might have pockets within your enterprise that use Scrum, and they are more effective than elsewhere. You are at least partially convinced that using Scrum throughout the enterprise might be a way to make the whole enterprise more...
Encyclopedia of Disasters: Environmental Catastrophes and Human Tragedies This encyclopedia is a descriptive, illustrated account of disasters, both natural and human-induced, that have occurred throughout the world at different times over the past two thousand years. They include experiences of earthquakes, tsunamis, volcanic eruptions, floods, extremes of weather, droughts, pandemic illnesses, land subsidence and... The Accidental Guerrilla: Fighting Small Wars in the Midst of a Big One David Kilcullen is one of the world's most influential experts on counterinsurgency and modern warfare. A Senior Counterinsurgency Advisor to General David Petraeus in Iraq, his vision of war dramatically influenced America's decision to rethink its military strategy in Iraq and implement "the surge."
Now, in The Accidental...
Short Stay Management of Heart Failure This handbook, under the auspices of the Society of Chest Pain Centers, is the first roadmap to treatment of heart failure patients in an observation unit. It gives practitioners a full understanding of the medical requirements, administrative processes, and regulatory issues involved in observation unit care of heart failure patients. The authors... Processing XML with Java: A Guide to SAX, DOM, JDOM, JAXP, and TrAX Written for Java programmers who want to integrate XML into their systems, this practical, comprehensive guide and reference shows how to process XML documents with the Java programming language. It leads experienced Java developers beyond the basics of XML, allowing them to design sophisticated XML applications and parse complicated documents.
Excel 2013 In Depth
Get more out of Microsoft Excel® 2013: more productivity and better answers for greater success! Drawing on his unsurpassed Excel experience, Bill Jelen (“Mr Excel”) brings together all the intensely useful knowledge you need: insights, techniques, tips, and shortcuts you just won’t find anywhere...