Gift Guide

Security In Wireless Lans And Mans / Edition 1

Hardcover (Print)
Buy Used
Buy Used from
(Save 37%)
Item is in good condition but packaging may have signs of shelf wear/aging or torn packaging.
Condition: Used – Good details
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 98%)
Other sellers (Hardcover)
  • All (13) from $1.99   
  • New (5) from $19.33   
  • Used (8) from $1.99   


With the popularity of the Wireless Local Area Network (WLAN) standard 802.11 WiFi and the growing interest in the next generation Wireless Metropolitan Area Network (WMAN) standard 802.16 WiMax, the need for effective solutions to the inherent security weaknesses of these networking technologies has become of critical importance. Thoroughly explaining the risks associated with deploying WLAN and WMAN networks, this groundbreaking book offers professionals practical insight into identifying and overcoming these security issues. Including detailed descriptions of possible solutions to a number of specific security problems, the book gives practitioners the hands-on techniques that they need to secure wireless networks in the enterprise and the home.
Read More Show Less

Product Details

  • ISBN-13: 9781580537551
  • Publisher: Artech House, Incorporated
  • Publication date: 7/31/2005
  • Series: Artech House Computer Security Series
  • Edition description: New Edition
  • Edition number: 1
  • Pages: 266
  • Product dimensions: 6.10 (w) x 9.20 (h) x 0.80 (d)

Table of Contents

Ch. 1 Introduction 1
Ch. 2 Authentication in WLANs : an overview 9
Ch. 3 EAP, TLS, and certificates 37
Ch. 4 EAP methods 57
Ch. 5 WEP 93
Ch. 6 802.11i security : RSNA 109
Ch. 7 CCMP 131
Ch. 8 TKIP 143
Ch. 9 Security in WiFi roaming 157
Ch. 10 3G-WLAN roaming 173
Ch. 11 An overview of 802.16 WMANs 189
Ch. 12 Wireless MAN security 211
Ch. 13 Conclusion and outlook 231
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted September 1, 2005


    The topics of this book are the security of 802.16 wireless metropolitan area networks (MANs) and 802.11 wireless local area networks (WLANs). Authors Thomas Hardjono and Lakshminath R. Dondeti have done an outstanding job of writing a book that provides a roadmap for readers seeking a deeper understanding of the security aspects of 802.11 WLANs today and the upcoming 802.16 WMANs. Hardjono and Dondeti begin this book by providing an introduction to WLANs and cover the basic network configuration of a WLAN and describe the entities involved. Next, the authors bring together EAP, TLS and Certificates, that are technologically crucial for authentication and for the security of WLANs and WMANs in general. In addition, the authors next devote their discussion exclusively to the EAP methods that are most commonly cited and used today in the 802.1X context. Next, they devote their discussion entirely to WEP in order to correctly explain its weaknesses and to understand what improvements need to be made. Then, they provide a discussion on the 4-way exchange used to derive unicast session keys and the protocols used to deliver these keys to their intended recipients. The authors then cover another important building block of the RSN. Next, they provide a discussion of TKIP. Next, they introduce the notion of roaming as found in today's dial-up Internet. The authors then elaborate on the new area of 3G-WLAN roaming. Next, they provide some basic background regarding 802.16, including network arrangement, frequency bands, the MAC security sublayer, and network entry/initialization. Then, they provide a discussion and insight into recent developments on the security of 802.16. Finally, they provide a brief summary of the book and ongoing work in 802.11 and 802.16 networks. With the preceding in mind, the authors have done an excellent job of bringing together and explaining the other broader areas of networking technology that are being impacted by the advent of 802.11 WLANs and 802.16 WMANs. Consequently, this book succeeds in explaining what current approaches and solutions have been adopted, and why these were chosen.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)