COMPLETE COVERAGE OF THE TECHNOLOGY THAT'S MAKING WIRELESS COMMUNICATIONS VIRTUALLY IMMUNE TO HACKERS!Wireless technology offers businesses a world of strategic advantages — and a host of security problems. But thanks to McGraw-Hill's "WiFi Security," your company's mission-critical data can be safeguarded, even against hackers intent on exploiting vulnerabilities in your business's network brought on by wireless communications.Written with insight by a leading wireless security expert, "WiFi Security: "Deals explicitly with wireless security for Windows 2000/XP, MAC OS X, Linux, Lindows OS, Palm OS, and PocketPC platformsReviews security approaches for the different standards currently competing for the U. S. marketAddresses data compromise, unauthorized access, and denial of service — all critical to WLAN usersCovers the 802.11 IEEE standard with regard to security, performance, and throughputDiscusses encryption and privacy through the Wireless Equivalent Privacy (WEP) protocolAnd much, much more!
FORMAT Paperback LANGUAGE English CONDITION Brand NewEnhance security and maintain privacy of mission-critical data, even when going wireless. This book covers 802.11 security for Windows, Linux, Macs, Palms, and other PDAs.
COMPLETE COVERAGE OF THE TECHNOLOGY THAT'S MAKING WIRELESS COMMUNICATIONS VIRTUALLY IMMUNE TO HACKERS!Wireless technology offers businesses a world of strategic advantages - and a host of security problems. But thanks to McGraw-Hill's WiFi Security, your company's mission-critical data can be safeguarded, even against hackers intent on exploiting vulnerabilities in your business's network brought on by wireless communications.Written with insight by a leading wireless security expert, WiFi Security: * Deals explicitly with wireless security for Windows 2000/XP, MAC OS X, Linux, Lindows OS, Palm OS, and PocketPC platforms * Reviews security approaches for the different standards currently competing for the U. S. market * Addresses data compromise, unauthorized access, and denial of service - all critical to WLAN users * Covers the 802.11 IEEE standard with regard to security, performance, and throughput * Discusses encryption and privacy through the Wireless Equivalent Privacy (WEP) protocol * And much, much more!
Stewart Miller (Carlsbad, CA) is a security and ERP consultant for such large corporations as EDS and IBM. He is the author of more than 10 books, including SAP R/3 Certification, ASAP, and Peoplesoft Integration. The certification book brought in over half a million dollars alone for McGraw-Hill. Stewart is currently being considered as the wireless security expert at a Southern California firm with several government contracts.
Chapter 1: Introduction to the Wireless LAN Industry Security Standards
Chapter 2: Technology
Chapter 3: Wireless LAN Security Factors
Chapter 4: Issues in Wireless Security
Chapter 5: The 802.11 Standard Defined
Chapter 6: Wi-Fi Security Infrastructure
Chapter 7: 802.11 Encryption: Wired Equivalent
Chapter 8: Unauthorized Access & Privacy
Chapter 9: Open System Authentication
Chapter 10: Direct Sequence Spread Spectrum
Chapter 11: Wi-Fi Equipment Issues
Chapter 12: Cross-Platform Wireless User Security
Chapter 13: Security Breach Vulnerabilities
Chapter 14: Access Control Schemes
Chapter 15: Wireless Laptop Users (PC & Mac)
Chapter 16: Administrative Security
Chapter 17: Security Issues for Wireless Applications (Wireless PDAs)
Chapter 18: The Future of Wi-Fi Security?
Index
At The Nile, if you're looking for it, we've got it. With fast shipping, low prices, friendly service and well over a million items - you're bound to find what you want, at a price you'll love!
No questions asked, 30 day returns!
FREE DELIVERYNo matter where you are in the UK, delivery is free.
SECURE PAYMENTPeace of mind by paying through PayPal and eBay Buyer Protection TheNile_Item_ID:6579497;