買這商品的人也買了...
-
TCP/IP Illustrated, Volume 1: The Protocols (Hardcover)$1,230$1,205 -
Designing Cisco Networks$2,220$2,109 -
計算機組織與設計--軟硬體界面第二版 (Computer Organization & Design, 2/e)$680$537 -
$399CCNA Self-Study: Interconnecting Cisco Network Devices (Hardcover) -
JSP 動態網頁入門實務$760$600 -
Mastering UML with Rational Rose 2002$2,090$1,986 -
ASP.NET 網頁製作教本─從基本語法學起$600$510 -
Linux Kernel Programming, 3/e$1,120$1,098 -
CCNA: Cisco Certified Network Associate Study Guide, 3/e$1,800$1,710 -
Computer Networking: A Top-Down Approach Featuring the Internet, 2/e (精裝)$1,090$1,068 -
C 語言程式技巧問答實戰 (The C Answer Book)$380$304 -
Managing the Testing Process, 2/e$1,300$1,274 -
JavaScript 範例活用辭典$450$351 -
macromedia Flash MX 網頁動畫寶典(威力新增版)$620$527 -
Dreamweaver MX for JSP 夢幻咖啡香$620$527 -
UML 教學手冊 (UML Weekend Crash Course)$199$155 -
Linux 核心程式設計 (Linux Kernel Programming, 3/e)$580$458 -
Dreamweaver MX 互動網站百寶箱 for ASP$580$493 -
ASP.NET 程式設計徹底研究$590$466 -
Borland 傳奇$280$221 -
Machine Learning (IE-Paperback)$1,100$1,078 -
人月神話:軟體專案管理之道 (20 週年紀念版)(The Mythical Man-Month: Essays on Software Engineering, Anniversary Edition, 2/e)$480$379 -
JSP 2.0 技術手冊$750$593 -
Reporting Service 實戰演練$690$587 -
跟 Macromedia 學 Flash MX 2004 (Macromedia Flash MX 2004 Training from the Source)$520$442
相關主題
商品描述
Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation, and an overall lack of privacy. This comprehensive book clearly shows you how to identify these vulnerabilities and protect yourself against them by building security into the network infrastructure and connected devices. Drawing on the latest research in the field, Vines offers a thorough examination of the fundamental concepts of security and basic computing technology. He first provides you with the necessary background on wireless and cellular technologies, looking at the various ways in which they are implemented. Youll then learn about a wide range of security methodologies and find out how to apply them to the wireless world. Finally, youll confront the security challenges with wireless systems and discover all of the options available to protect your information.
A complete guide to current wireless technologies and standards, security risks, and proven security solutions, Wireless Security Essentials explores:
- Wireless data networking technologies and the wireless application protocol
- Wireless standards and technologies
- Cryptographic technologies and PKI
- Threats to personal electronic devices like Palm Wireless Handhelds, PocketPCs, Internet-enabled cell phones, and BlackBerrys
- WAP security
- Security monitoring and testing
- Hardware and software solutions
Table of Contents
Preface.
Introduction.
Part I: Technology Essentials.
Chapter 1: Computing Technology.
Chapter 2: Wireless Theory.
Chapter 3: Wireless Reality.
Part II: Security Essentials.
Chapter 4: Security Concepts and Methodologies.
Chapter 5: Security Technologies.
Chapter 6: Threats and Solutions.
Appendix A: Glossary.
Appendix B: A WLAN Exploitation Guide.
Appendix C: Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.
Appendix D: NASA White Paper on the Wireless Firewall Gateway.
Appendix E: Referenced Documents and URLs.
Index.