- Shopping Bag ( 0 items )
Part I: Technology Essentials.
Chapter 1: Computing Technology.
Chapter 2: Wireless Theory.
Chapter 3: Wireless Reality.
Part II: Security Essentials.
Chapter 4: Security Concepts and Methodologies.
Chapter 5: Security Technologies.
Chapter 6: Threats and Solutions.
Appendix A: Glossary.
Appendix B: A WLAN Exploitation Guide.
Appendix C: Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.
Appendix D: NASA White Paper on the Wireless Firewall Gateway.
Appendix E: Referenced Documents and URLs.
Posted August 12, 2002
Two thumbs up! In depth coverage, but easy to read. The fifteen pages of references gives an indication of the extent of research backing this book, not to mention the author's extensive background in computer security. I like the fact that each chapter stands on it's own - You can dive in wherever you like and sink your teeth into it. The well thought-out formatting and illustrations make it a breeze to navigate. Whether you're looking for a guide to wireless security, or for a reference book on the alphabet soup of protocols and standards, this book is the answer!Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.