
Wireless Security Essentials
Defending Mobile Systems from Data Piracy
Résumé
Protect your wireless systems from attack with this clear-cut guide on how to implement proven security methodologies
Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation, and an overall lack of privacy. This comprehensive book clearly shows you how to identify these vulnerabilities and protect yourself against them by building security into the network infrastructure and connected devices. Drawing on the latest research in the field, Vines offers a thorough examination of the fundamental concepts of security and basic computing technology. He first provides you with the necessary background on wireless and cellular technologies, looking at the various ways in which they are implemented. You.ll then learn about a wide range of security methodologies and find out how to apply them to the wireless world. Finally, you.ll confront the security challenges with wireless systems and discover all of the options available to protect your information.
A complete guide to current wireless technologies and standards, security risks, and proven security solutions, Wireless Security Essentials explores:
- Wireless data networking technologies and the wireless application protocol
- Wireless standards and technologies
- Cryptographic technologies and PKI
- Threats to personal electronic devices like Palm Wireless Handhelds, PocketPCs, Internet-enabled cell phones, and BlackBerrys
- WAP security
- Security monitoring and testing
- Hardware and software solutions
Contents
Part I: Technology Essentials.
- Chapter 1: Computing Technology.
- Chapter 2: Wireless Theory.
- Chapter 3: Wireless Reality.
Part II: Security Essentials.
- Chapter 4: Security Concepts and Methodologies.
- Chapter 5: Security Technologies.
- Chapter 6: Threats and Solutions.
- Appendix A: Glossary.
- Appendix B: A WLAN Exploitation Guide.
- Appendix C: Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.
- Appendix D: NASA White Paper on the Wireless Firewall Gateway.
- Appendix E: Referenced Documents and URLs.
L'auteur - Russell Dean Vines
RUSSELL DEAN VINES, CISSP, CCNA, MCSE, MCNE, is
President and founder of the RDV Group Inc., a New York
Citybased security consulting services firm. His company is
active in detecting, preventing, and solving security
vulnerabilities for clients in government, finance, and new
media organizations. He directed the Security Consulting
Services Group for Realtech Systems Corporation, and
managed international information networks for CBS/Fox
Video, Inc. Vines is the author of Wireless Security
Essentials and coauthor of The CISSP Prep Guide (both from
Wiley).
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Wiley |
Auteur(s) | Russell Dean Vines |
Parution | 27/08/2002 |
Nb. de pages | 346 |
Format | 19 x 23,2 |
Couverture | Broché |
Poids | 630g |
Intérieur | Noir et Blanc |
EAN13 | 9780471209362 |
ISBN13 | 978-0-471-20936-2 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet
- Informatique Réseaux et télecommunications Réseaux sans fil et télécommunications mobiles