Secure Your Wireless Networks the Hacking Exposed WayDefend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing inf
Provides a step-by-step approach for planning and implementing a wireless LAN based on 802.11 Wireless Fidelity (Wi-Fi) technologyAuthors are Wi-Fi security experts who are able to address the firesto
The ONLY official study guide for the industry-standard wireless security certification examCowritten by the creators of the exam and leading experts in wireless security, CWSP Certified Wireless Secu
REAL-WORLD WIRELESS SECURITYThis comprehensive guide catalogs and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas
Wireless Security End to End is a comprehensive guide covering encryption, PKI, SSL, third party certificate validation, Smart card, pin authentication, device level security, threat analysis, strateg
Designed to help networking professionals take advantage of the innovative features of broadband wireless networks, this helpful volume provides a detailed tutorial--complete with hands-on examples, i
Wireless data, the high-speed transfer of email, stock information, messages, and even video and audio across wireless networks, is expected to become a$7.5 billion business within the next three year
Enhance security and maintain privacy of mission-critical data, even when going wireless. This book covers 802.11 security for Windows, Linux, Macs, Palms, and other PDAs.
Reviews the fundamentals and math of radio frequency theory, and the technologies and tasks required to install, manage, and support wireless LAN networks. Written by Planet3 Wireless employees, the
New and Updated Material: * Each part opens with a brand new case study based on real security scenarios * Brand new chapter covers the latest 802.11 Wireless networking security attacks and counter
Within three years, more than 500 million people will be using some form of wireless device. To marketers just learning the rules of online sales, the marketing possibilities of wireless communication
An ideal starting point for anyone wanting to learn about next generation wireless networksGives important insights into the design of wireless IP networksIllustrates the standards and network archite
GPRS (General Packet Radio Service) is global mobile data technology. More important it is a step en route to next-generation wireless, or 3G, for many networks in the US and most networks in Europe a
The past, present, and future of wireless telecom technology -- explained in one volumeThe convergence of current cellular and PC voice networks with the new wireless networks means anyone working in
"The ONLY official study guide for the brand-new, entry-level Wireless# certificationReviewed and approved by the exam developers at Planet3 Wireless, Wireless# Certification Official Study Guide thor
Third Generation (3G) wireless networks are in the works in Europe and Asia, and 2.5G networks that incorporate some 3G features are being rolled out in the United States Hands-on guide to integrating
This is the definitive, real-world professionals guide to selecting, networking, configuring and securing the bevy of wireless devices for a truly wireless experience.Wireless Devices End to End is pa
A comprehensive account of recent algorithms developed in computational number theory and primality testing. Provides a general framework for the theoretical study of public key cryptography and pseud
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Most books about cryptography are organized historically,
Covers Mac OS X Panther and its bundled applications in detail, while handling more challenging topics such as networking, Internet security, wireless operation, and maintenance in an approachable way
- VPNs (Virtual Private Networks) are a cheap and secure way for companies to transmit information over the internet- Covers key new VPN protocols, IP Sec (Security) and MPLS (switching)- How to build
Within the next few years, 40% - 50% of all companies will attempt to execute a wireless application strategy--bringing the number of wireless data users to a whopping 36 million by 2003 Wireless LANs
This guide for security professionals, system administrators, and auditors describes how to implement enterprise-wide security solutions based on detailed traffic and attack analysis. It is intended t
An accessible and step-by-step approach to using VB.NET and XML enterprise application developmentXML is a tool for interacting with, describing, and transporting data between machines across networks
Develop and execute winning wireless strategies for your company Offering the prospect of instantaneous, cable-free Internet connectivity and an array of Web services to cell phones, handheld computer
For network administrators and network engineers who need to understand, configure, design, and troubleshoot, on a variety of networks using Cisco products. After introducing LAN and WAN protocols, th
Social Security and Medicare are the bedrock of your future financial security. You paid for them—now make them work for you, starting today! SOCIAL SECURITY: THE INSIDE STORY is detailed. Compreh
Security Smarts for the Self-Guided IT ProfessionalSecure web application from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent
Based on the author's working experience as a design engineer at the world's top mobile phone and wireless component companies, Das introduces practitioners and students to mobile handset technologie
Fully revised and updated version of the successful "Advanced Wireless Communications" Wireless communications continue to attract the attention of both research community and industry. Since the fir
The need for information security management has never been greater. With constantly changing technology, external intrusions, and internal thefts of data, information security officers face threats
Fun projects and valuable content join forces to enable readers to turn their wireless home network into a high-performance wireless infrastructure capable of entertainment networking and even home au
Using wireless technology to create a new kind of brand relationship with customers. ""If you’re in marketing, advertising, or branding, consider this: While it used to take three televisi
"RF spectrum is the most valuable commodity in the wireless market – the wireless equivalent of real estate. Without the necessary spectrum – and the skills to manage it – companies cannot hope to com
Build a wired or wireless Linksys network in your home or office easily with help from this one-stop guide. Inside, you’ll find details on selecting the right hardware and components for your needs, i