買這商品的人也買了...
-
$1,205TCP/IP Illustrated, Volume 1: The Protocols (Hardcover)
-
$2,170$2,062 -
$680$537 -
$399CCNA Self-Study: Interconnecting Cisco Network Devices (Hardcover)
-
$760$600 -
$2,040$1,938 -
$600$474 -
$1,120$1,098 -
$1,750$1,663 -
$1,090$1,068 -
$380$304 -
$1,300$1,274 -
$450$351 -
$620$527 -
$620$527 -
$199$155 -
$580$458 -
$580$493 -
$590$466 -
$280$221 -
$1,078Machine Learning (IE-Paperback)
-
$480$379 -
$750$593 -
$690$587 -
$520$411
相關主題
商品描述
Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation, and an overall lack of privacy. This comprehensive book clearly shows you how to identify these vulnerabilities and protect yourself against them by building security into the network infrastructure and connected devices. Drawing on the latest research in the field, Vines offers a thorough examination of the fundamental concepts of security and basic computing technology. He first provides you with the necessary background on wireless and cellular technologies, looking at the various ways in which they are implemented. Youll then learn about a wide range of security methodologies and find out how to apply them to the wireless world. Finally, youll confront the security challenges with wireless systems and discover all of the options available to protect your information.
A complete guide to current wireless technologies and standards, security risks, and proven security solutions, Wireless Security Essentials explores:
- Wireless data networking technologies and the wireless application protocol
- Wireless standards and technologies
- Cryptographic technologies and PKI
- Threats to personal electronic devices like Palm Wireless Handhelds, PocketPCs, Internet-enabled cell phones, and BlackBerrys
- WAP security
- Security monitoring and testing
- Hardware and software solutions
Table of Contents
Preface.
Introduction.
Part I: Technology Essentials.
Chapter 1: Computing Technology.
Chapter 2: Wireless Theory.
Chapter 3: Wireless Reality.
Part II: Security Essentials.
Chapter 4: Security Concepts and Methodologies.
Chapter 5: Security Technologies.
Chapter 6: Threats and Solutions.
Appendix A: Glossary.
Appendix B: A WLAN Exploitation Guide.
Appendix C: Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.
Appendix D: NASA White Paper on the Wireless Firewall Gateway.
Appendix E: Referenced Documents and URLs.
Index.