Wireless Security Essentials: Defending Mobile Systems from Data PiracyISBN: 978-0-471-20936-2
Paperback
368 pages
July 2002
This title is out-of-print and not currently available for purchase from this site.
|
Preface.
Introduction.
Part I: Technology Essentials.
Chapter 1: Computing Technology.
Chapter 2: Wireless Theory.
Chapter 3: Wireless Reality.
Part II: Security Essentials.
Chapter 4: Security Concepts and Methodologies.
Chapter 5: Security Technologies.
Chapter 6: Threats and Solutions.
Appendix A: Glossary.
Appendix B: A WLAN Exploitation Guide.
Appendix C: Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.
Appendix D: NASA White Paper on the Wireless Firewall Gateway.
Appendix E: Referenced Documents and URLs.
Index.
Introduction.
Part I: Technology Essentials.
Chapter 1: Computing Technology.
Chapter 2: Wireless Theory.
Chapter 3: Wireless Reality.
Part II: Security Essentials.
Chapter 4: Security Concepts and Methodologies.
Chapter 5: Security Technologies.
Chapter 6: Threats and Solutions.
Appendix A: Glossary.
Appendix B: A WLAN Exploitation Guide.
Appendix C: Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.
Appendix D: NASA White Paper on the Wireless Firewall Gateway.
Appendix E: Referenced Documents and URLs.
Index.