Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Wireless Security and Privacy
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Wireless Security and Privacy

Wireless Security and Privacy

Best Practices and Design Techniques

Tara M. Swaminatha, Charles R. Elden

300 pages, parution le 26/09/2002

Résumé

As wireless technology emerges into the mainstream of the networking and communications markets, the wireless development community has a unique opportunity to be proactive, rather than reactive, in its approach to security. At this early point in the wireless industry, developers can anticipate future security needs and integrate security considerations into every stage of the development process. Wireless Security and Privacy shows developers how to take advantage of this exceptional opportunity.
Written for wireless development professionals new to security, as well as security professionals moving into the wireless arena, this book presents the foundation upon which to design and develop secure wireless systems. It looks in depth at the key issues faced by those who develop wireless devices and applications, describes the technology and tools that are now available, and offers a proven methodology for designing a comprehensive wireless risk management solution.
In particular, Wireless Security and Privacy documents the I-ADD process, which offers a standardized, systematic approach for identifying targets, analyzing vulnerabilities, defining strategies, and designing security into the entire development lifecycle of a wireless system.
The book also examines such important topics as:

  • Fundamental wireless and security principles
  • Specific wireless technologies, including 802.11b, Bluetooth, and WAP
  • The security implications of the architecture of PDAs, cell phones, and wireless network cards for laptops
  • The security shortcomings of wireless development languages
  • Development of a riskmodel for a wireless system
  • Cryptography essentials
  • The role of COTS products in a comprehensive security solution
  • Privacy policy and legal issues
  • Analysis of known and theoretical attacks
  • Security, financial, and functionality tradeoffs
  • Several case studies run throughout the book, illustrating the application of important concepts, techniques, strategies, and models.
In all, this practical guidebook builds a framework for understanding the present and future of wireless security and offers the specific security strategies and methodologies that are critical for success in this fast-moving market.
Contents

I. INTRODUCTORY TOPICS

  • 1. Wireless Technologies
  • 2. Security Principles

II. KNOW YOUR SYSTEM

  • 3. Technologies
  • 4. Devices
  • 5. Languages

III. PROTECT YOUR SYSTEM

  • 6. Cryptography
  • 7. COTS
  • 8. Privacy

IV. I-ADD

  • 9. Identify
  • 10. Analyze (Attacks & Vulnerabilities)
  • 11. Analyze (Mitigations & Protections)
  • 12. Define & Design
  • Future Research

L'auteur - Tara M. Swaminatha

Tara M. Swaminatha is an information security administrator for the International Finance Corporation, a part of the World Bank Group. Tara is responsible for educating the IFC about information security, conducting technical product evaluations, offering security classes to employees, and assisting with the definition and implementation of plans for security best practices and technologies. Previously Tara was a software security consultant with Cigital's Software Security Group (SSG). The SSG provides software security risk analysis for a broad range of clients. Tara also worked for PEC Solutions on a team that developed software and infrastructure for agencies within the U.S. Department of Justice. She implemented configuration control practices, maintained integrity of the development and production environments, and performed software, hardware, and multi-system integration. Tara holds both a B.A. in sociology and an M.T. in special education from the University of Virginia, where she graduated with high distinction. While working at the IFC, Tara is also pursuing her J.D. at Georgetown University.

L'auteur - Charles R. Elden

Charles R. Elden is an independent security consultant. He worked most recently at Cigital, where he was a manager and software security consultant with Cigital's Software Security Group. He has experience performing communication and software systems risk analysis and risk management. Previously he worked for the Central Intelligence Agency for 12 years and has worked for more than 11 years in the Directorate of Science and Technology's Office of Technical Services. Charles has extensive experience designing, developing, deploying, and exploiting secure and covert computing and communication systems. He received his M.S. in computer science from George Mason University and his B.S. in computer science/computer engineering from Michigan State University.

Caractéristiques techniques

  PAPIER
Éditeur(s) Addison Wesley
Auteur(s) Tara M. Swaminatha, Charles R. Elden
Parution 26/09/2002
Nb. de pages 300
Format 18,7 x 23
Couverture Broché
Poids 605g
Intérieur Noir et Blanc
EAN13 9780201760347

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav.client@eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription