rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780471209362

Wireless Security Essentials : Defending Mobile Systems from Data Piracy

by
  • ISBN13:

    9780471209362

  • ISBN10:

    0471209368

  • Format: Paperback
  • Copyright: 2002-07-01
  • Publisher: Wiley
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $55.00 Save up to $0.05
  • Buy New
    $54.95
    Add to Cart Free Shipping Icon Free Shipping

    PRINT ON DEMAND: 2-4 WEEKS. THIS ITEM CANNOT BE CANCELLED OR RETURNED.

Summary

As wireless device usage increases worldwide, so does the potential for malicious code attacks. In this timely book, a leading national authority on wireless security describes security risks inherent in current wireless technologies and standards, and schools readers in proven security measures they can take to minimize the chance of attacks to their systems. * Russell Dean Vines is the coauthor of the bestselling security certification title, The CISSP Prep Guide (0-471-41356-9) * Book focuses on identifying and minimizing vulnerabilities by implementing proven security methodologies, and provides readers with a solid working knowledge of wireless technology and Internet-connected mobile devices

Author Biography

RUSSELL DEAN VINES is founder and President of The RDV Group Inc., a New York City—based security consulting services firm. His company is active in detecting, preventing, and solving security vulnerabilities for clients in government, finance, and new media organizations. Vines is also a frequent speaker on security issues and coauthor of the bestselling book The CISSP Prep Guide: Mastering the Ten Domains of Computer Security (Wiley).

Table of Contents

Preface.
Introduction.
Part I: Technology Essentials.
Chapter 1: Computing Technology.
Chapter 2: Wireless Theory.
Chapter 3: Wireless Reality.
Part II: Security Essentials.
Chapter 4: Security Concepts and Methodologies.
Chapter 5: Security Technologies.
Chapter 6: Threats and Solutions.
Appendix A: Glossary.
Appendix B: A WLAN Exploitation Guide.
Appendix C: Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.
Appendix D: NASA White Paper on the Wireless Firewall Gateway.
Appendix E: Referenced Documents and URLs.
Index.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program