The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!Communications engineers need to master a wide area of topics to excel. The Wireless Security Know It All covers every angle including Emerging Wireless Technologies and Security Issues, Wireless LAN and MAN Security, as well as Wireless Personal Area Networks.
The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!Communications engineers need to master a wide area of topics to excel. The Wireless Security Know It All covers every angle including Emerging Wireless Technologies and Security Issues, Wireless LAN and MAN Security, as well as Wireless Personal Area Networks.
Artikelnr. des Verlages: B978-1-85617-529-6.X0001-8
Seitenzahl: 744
Erscheinungstermin: 1. August 2008
Englisch
Abmessung: 234mm x 188mm x 48mm
Gewicht: 1502g
ISBN-13: 9781856175296
ISBN-10: 1856175294
Artikelnr.: 23880814
Herstellerkennzeichnung
Libri GmbH
Europaallee 1
36244 Bad Hersfeld
gpsr@libri.de
Autorenporträt
Frank Thornton runs his own technology consulting firm, Blackthorn Systems, which specializes in information security and wireless networks. His specialties include wireless network architecture, design, and implementation, as well as network troubleshooting and optimization. An interest in amateur radio helped him bridge the gap between computers and wireless networks. Having learned at a young age which end of the soldering iron was hot, he has even been known to repair hardware on occasion.
In addition to his computer and wireless interests, Frank was a law enforcement officer for many years. As a detective and forensics expert he has investigated approximately one hundred homicides and thousands of other crime scenes. Combining both professional interests, he was a member of the workgroup that established ANSI Standard "ANSI/NIST-CSL 1-1993 Data Format for the Interchange of Fingerprint Information."
Alan Bensky, MScEE, an electronics engineering consultant with over 25 years of experience in analog and digital design, management, and marketing. Specializing in wireless circuits and systems, Bensky has carried out projects for varied military and consumer applications. He is the author of Short-range Wireless Communication, Second Edition, published by Elsevier, 2004, and has written several articles in international and local publications. He has taught courses and gives lectures on radio engineering topics. Bensky is a senior member of IEEE.
Security Definitions and Concepts Attacks and risks Security monitoring and protocols Performance monitoring Reporting Security standards Wireless encryption
Wireless LAN and MAN Security Security concerns Counteracting risks Application layer vulnerabilities and analysis Data link vulnerabilities and analysis Physical layer vulnerabilities and analysis 802.11 security mechanisms Wi-Fi Alliance security policies WPA and WPA2 WiMax security policies
Wireless Personal Area Networks Bluetooth standards and security issues Security risks Counteracting risks Performance impacts Standard security mechanisms Security policies
Wireless Handheld Devices Overview of handheld security concerns Security requirements Countermeasures Impact on performance Security standards and policies
Security Definitions and Concepts Attacks and risks Security monitoring and protocols Performance monitoring Reporting Security standards Wireless encryption
Wireless LAN and MAN Security Security concerns Counteracting risks Application layer vulnerabilities and analysis Data link vulnerabilities and analysis Physical layer vulnerabilities and analysis 802.11 security mechanisms Wi-Fi Alliance security policies WPA and WPA2 WiMax security policies
Wireless Personal Area Networks Bluetooth standards and security issues Security risks Counteracting risks Performance impacts Standard security mechanisms Security policies
Wireless Handheld Devices Overview of handheld security concerns Security requirements Countermeasures Impact on performance Security standards and policies