AnyBook4Less.com
Find the Best Price on the Web
Order from a Major Online Bookstore
Developed by Fintix
Home  |  Store List  |  FAQ  |  Contact Us  |  
 
Ultimate Book Price Comparison Engine
Save Your Time And Money

Wireless Security: Models, Threats, and Solutions

Please fill out form in order to compare prices
Title: Wireless Security: Models, Threats, and Solutions
by Randall K. Nichols, Panos C. Lekkas
ISBN: 0-07-138038-8
Publisher: McGraw-Hill Professional
Pub. Date: 13 December, 2001
Format: Paperback
Volumes: 1
List Price(USD): $65.00
Your Country
Currency
Delivery
Include Used Books
Are you a club member of: Barnes and Noble
Books A Million Chapters.Indigo.ca

Average Customer Rating: 4.46 (13 reviews)

Customer Reviews

Rating: 5
Summary: The most comprehensive all around
Comment: The Approach:
You can find elsewhere any of the issues covered by this book. But only in this book, they are presented all together in detail. Every wireless security related field is discussed and the correspondent defensive and preventive countermeasures are proposed.

The Book:
657+ pages, well structured into 13 chapters. Literally, hundreds of useful references, and plenty of figures, tables, and photos.

The contents:
- Wireless Basics
- Wireless Information Warfare
- Telephone System Vulnerabilities
- Satellite Communications
- Cryptographic Security
- Speech Cryptology
- WLAN
- WAP
- WTLS
- Bluetooth
- Voice Over IP
- E2E Wireless Security
- Optimizing Wireless Security with ASICs and FPGAs
- Extensive Bibliography

The Bottom Line:
As a researcher and professor of Computer Networks Security, I consider this book as a very useful reference for my students. Even if they use the book mostly to learn about WLAN, WAP, WTLS, and Bluetooth security issues, many of them (the students) have been exploring the rest of the book to improve their knowledge. As far as I know, they use particularly: the cryptographic chapters to complement the regular (Dr. Stallings) textbook, and the Wireless Information Warfare chapter to improve their general background.
A unique in its kind book.

Rating: 5
Summary: Extremely Useful!
Comment: I'm an active systems architect from Sweden working with multiple types of wireless communications devices(cellular, Bluetooth, etc.). I have been looking for a comprehensive coverage of security aspects in RF transmissions for quite some time. A colleague of mine recommended this book to me.

My first reaction was surprise due to the breadth of its coverage. It gives a well-rounded view of the subject in a very scholarly fashion. It is very meticulously written, clearly by people who know what they are talking about, and it includes some interesting issues like voice processing and cryptography without ever becoming boring. It provides a great deal of references so one can pursue further and deeper study of the subjects that one is interested in. Lots of footnotes and explanations show the authors' attention and care about detail.

My interest happens to be in implementing embedded integrated systems and this book provided me with ample food for thought with its original coverage of issues related to cipher synchronization in real-time wireless communications protocol stacks. To my knowledge, the subject is not covered anywhere else.

Besides a couple of typos probably due to the publisher's rush to bring the book to the market, I strongly recommend this book to anyone who is interested in the area of wireless communications security.

Rating: 5
Summary: An Excellent Choice for the Professional
Comment: I really enjoyed reading this book. It gave a lot of sight on Wireless Security and gave a lot of useful information. Some of the chapters are long, but don't let that discourage you from purchasing the book. I found the last two chapters really challenging and difficult. Lan experience will help you get through the book. Some of the wireless solutions are easy to understand, and some of the wireless solutions are difficult. I would recommend this book to anyone who wants to learn or write a paper on wireless security.

Similar Books:

Title: Maximum Wireless Security
by Cyrus Peikari, Seth Fogie
ISBN: 0672324881
Publisher: Sams
Pub. Date: 18 December, 2002
List Price(USD): $39.99
Title: Real 802.11 Security: Wi-Fi Protected Access and 802.11i
by Jon Edney, William A. Arbaugh
ISBN: 0321136209
Publisher: Addison-Wesley Pub Co
Pub. Date: 15 July, 2003
List Price(USD): $44.99
Title: Wireless Security
by Merritt Maxim, David Pollino
ISBN: 0072222867
Publisher: Osborne/McGraw-Hill
Pub. Date: 29 April, 2002
List Price(USD): $49.99
Title: Hack Proofing Your Wireless Network
by Christian Barnes, Tony Bautts, Donald Lloyd, Eric Ouellet, Jeffrey Posluns, David M. Zendzian, Neal O'Farrell
ISBN: 1928994598
Publisher: Syngress
Pub. Date: 28 February, 2002
List Price(USD): $49.95
Title: Incident Response and Computer Forensics, Second Edition
by Chris Prosise, Kevin Mandia, Matt Pepe
ISBN: 007222696X
Publisher: Osborne/McGraw-Hill
Pub. Date: 17 July, 2003
List Price(USD): $49.99

Thank you for visiting www.AnyBook4Less.com and enjoy your savings!

Copyright� 2001-2021 Send your comments

Powered by Apache