- Shopping Bag ( 0 items )
Uses forensic-based analysis to give the reader an insight into the mind of a hacker
With the growth of wireless networks architects, engineers and administrators will need this book
Up to the minute Web based support at firstname.lastname@example.org
This is the only book written specifically for architects, engineers, and administrators responsible for securing their wireless networks. From making sense of the various acronyms (WAP, WEP, SSL, PKE, PKI, SSL, SSH, IPSEC) to implementing security policies, plans, and recovery protocols, this book helps users secure their wireless network before its security is compromised.
Posted August 12, 2002
This book looks promising but the editors were apparently asleep at the wheel. The overall topic coverage is okay. The main problems stem from two things. 1 - the book was obviously written by multiple authors because several chapters cover the same thing over and over. A significant portion of the book turns out to be the same information covered in different chapters. 2 - The typos and missing information pieces are terrible. For instance, chapter three has a table covering the 802.11 standards and just cuts off in the middle of the table; the last several entries are not included. Several chapters reverse 802.11a and 802.11b - often in the same chapter. Save yourself some money and pick up one of the other books such as O'Reilly's on the topic.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.