Wireless Network Security: Second Edition
โ Scribed by Wolfgang Osterhage
- Publisher
- CRC Press
- Year
- 2018
- Tongue
- English
- Leaves
- 203
- Edition
- Second edition
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Wireless communications have become indispensable part of our lives. The book deals with the security of such wireless communication. The technological background of these applications have been presented in detail. Special emphasis has been laid on the IEEE 802.11x-standards that have been developed for this technology. A major part of the book is devoted to security risks, encryption and authentication. Checklists have been provided to help IT administrators and security officers to achieve the maximum possible security in their installations, when using wireless technology.
This is the second edition of the book. The updates include the latest the IEEE 802.11-standard, an updated chapter on PDA, the increased relevance of smart phones and tablets, widespread use of WLAN with increased security risks.
โฆ Table of Contents
Content: PrefaceIntroduction Network Security Introduction Weaknesses in Network Security Relevant Resources Objectives of a Security Strategy Security Aspects concerning the Internet WLAN WLAN Basic Principles IEEE 802.11 Overview Wireless Fidelity WMAN Key Terminology Architecture and Components Security Requirements Recent Developments Mobile Phones ContextBasic Principles Communication Protocols Services Mobile Phones and WLAN Threats and Protection Special Case Blackberries VoIP Security Check Directive Checklist Bluetooth Introduction Technical BasicsSystem Topology Connecting to the Network Version Security Aspects Risk Potentials Countermeasures Checklist Infra Red Background IrDA Applications Security Aspects Checklist Near Field CommunicationIntroduction Technology Specifications Security Aspects Conclusions Security Policy Introduction Scope Information and Communication Security Physical Security Documentation Wireless Security Summary Emergency Management in Communication Networks Emergency Management Systems Standards Requirements for Businesses BCM Overview Training and Testing Contents of an Emergency Concept (Documentation) Intermediate Conclusions The Emergency Process References
โฆ Subjects
Wireless communication systems -- Security measures;Mobile communication systems -- Security measures;Wireless LANs -- Security measures;TECHNOLOGY & ENGINEERING / Telecommunication
๐ SIMILAR VOLUMES
Nowadays one only needs to read the newspaper headlines to appreciate the importance of Industrial Network Security. Almost daily an article comes out describing the threat to our critical infrastructure, from spies in our electrical grid to the looming threat of cyberwar.<P>Whether we talk about pr
Nowadays one only needs to read the newspaper headlines to appreciate the importance of Industrial Network Security. Almost daily an article comes out describing the threat to our critical infrastructure, from spies in our electrical grid to the looming threat of cyberwar.<P>Whether we talk about pr
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the a
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the a