PERHAPS A GIFT VOUCHER FOR MUM?: MOTHER'S DAY

Close Notification

Your cart does not contain any items

$294

Hardback

Not in-store but you can order this
How long will it take?

QTY:

English
Auerbach
16 December 2005
The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker. This wide scope benefits anyone who has to administer, secure, hack, or conduct business on a wireless network.

This text tackles wireless risk from many angles. It discusses the mitigation of wireless risk at the policy level, cost-effective ways of deploying wireless across large enterprises, and financial controls that reduce unforeseen risks in wireless projects. The handbook also offers the technical details of how you can design, build, and hack nearly all wireless security components.

This volume also helps advance your career by covering all of the objectives of the three widely recognized wireless certifications--those administered by Planet3 Wireless and Cisco Systems. The book focuses on the wireless local area networking technologies that help you meet these objectives, while also analyzing almost all other facets of mobile communications.

By:  
Contributions by:   , , , , ,
Imprint:   Auerbach
Country of Publication:   United Kingdom
Dimensions:   Height: 234mm,  Width: 156mm,  Spine: 25mm
Weight:   720g
ISBN:   9780849333781
ISBN 10:   0849333784
Pages:   382
Publication Date:  
Audience:   Professional and scholarly ,  Undergraduate
Format:   Hardback
Publisher's Status:   Active
Wireless network overview. Risks and threats of wireless. The reality of computer crime. Wireless physical layer technologies. Wireless management frames. Wireless local and personal area networks. Wide area wireless technologies. Wireless antenna theory. The wireless deployment process. Wireless access points. Wireless end devices. Wireless LAN security. Breaking wireless security. Wireless security policy. Wireless security architectures. Wireless tools.

Aaron E. Earle

See Also