Book Reviews - Browse Book Reviews Categories Book Reviews - Search Book Reviews Book Reviews - About Us Book Reviews - FAQ
 
Book Reviews Categories

Accessories Arts & Photography Audio CDs Audiocassettes Bargain Books Biographies & Memoirs Business & Investing Calendars Children's Books Computers & Internet Cooking, Food & Wine Entertainment Gay & Lesbian Health, Mind & Body History Holiday Greeting Cards Home & Garden Horror Large Print Literature & Fiction Mystery & Thrillers Non-Fiction Outdoors & Nature Parenting & Families Professional & Technical Reference Religion & Spirituality Romance Science Science Fiction & Fantasy Sheet Music & Scores Sports Teens Travel e-Books & e-Docs

Link Partners:
Literature Forums Define Words Electronic Dictionary Writers Wanted Writing Forums Writing Articles Writing Resources Cheat Literature Vault XBox Cheats Cheats Literary Escape Cheat Codes PS3 Demon Gaming PS3 Cheats XG Cheats



















































































































































 

Book Reviews

Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Book: Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Written by: Jon Edney William A. Arbaugh
Publisher: Addison-Wesley Professional
Average Customer Rating: 5.0 / 5

Very good 802.11 book
Rating: 4 / 5
Real 802.11 Security: Wi-Fi Protected Access and 802.11i is a very good book for those who are concerned with wireless security, or should I say, wireless insecurity.

After reading Real 802.11 Security: Wi-Fi Protected Access and 802.11i, you will have a good chance to secure your wireless network.


The Best Details For Wireless Security
Rating: 5 / 5
This is a very advanced book, not for the meek at heart. Exceptionally well written with five pages of references, three pages of acronyms and three appendices: AES encryption / block cipher, message modification and file integrity. The authors spare no details about wireless security, yet are still able to make thing easy to understand. Written from an engineering standpoint with emphasis on design and construction of wireless networks, Real 802.11 Security gets down to the nuts and bolts of how wireless works, the current standards now in use and the design implications of the newest standards in development.

Edney and Arbaugh show just how "loose" current wireless systems really are, their vulnerabilities and the most common attack methods used, including man in the middle, WEP cracking and MAC spoofing. They detail the layers of transmittion and how those layers interact in the most common wireless scenarios. They also define the terms and uses of current wireless security including the latest methods under development.

The authors start by making sense of the alphabet soup of wireless security including WEP, RSN, 802.1x, LEAP, PEAP and Radius. They dig down to the actual tools and processes used to hack wireless networks and give excellent summaries of the most commonly used methods. Their examples detail the uses of headers, their encryption and the algorithms used by each security protocol. They then show how each protocol is broken down, how server and client interact and the security holes present.

After a good overview of the current landscape, Edney and Arbaugh go on to show the reader how each protocol stacks up against one another, thus allowing the reader greater flexibility to decide just which type or types of security maybe right for their wireless environment(s). They also give very good examples of the problems inherent to communication and authentication in highly mobile, fast paced environments. The authors go into the details and difficulties of how to strengthen wireless networks thru the understanding and use of algorithms, hardware authentication and transport layer security.

Edney and Arbaugh finalize their book by showing how the protocols are applied and the details of implementing Wi-Fi security in day-to-day actual situations. They use screen shots of actual tools in use making it easier for the novice radio buff to understand the whole process. Any white hat will enjoy the final chapter as the authors proceed to show details on how to craft your own client and server side certificates, construct and harden a RADIUS server using open source software and plan your network.

A must read for all IT professionals running wireless in any sensitive environment. As a learning experience Real 802.11 Security should not be taken lightly by any professional currently designing and implementing wireless solutions.




For serious understanding of 802.11 security issues
Rating: 5 / 5
This is the most comprehensive book on the issues of 802.11 security I have found to date. Most books simply reiterate the basics of wireless security architecture and then spend a chapter or two on the hacking tools for locating networks and defeating WEP. Edney and Arbaugh start with the basic insecurities, and then build on the explanation layer after layer from the overview to the cryptography and its implementation. You as the reader decide how deep your understanding needs to go.

This book covers WEP, WPA and 802.11i in detail. As its title suggests, it is focused on the issues of security so don't expect a general treatment of Wireless Architecture in addition. This is the most definitive book I have seen about the exposures of the security mechanisms themselves, but you will need a volume that covers site survey and architecture to appreciate all of the issues involved in 802.11 I found chapter on Security Principals especially accessible reading for those new to the Infosec field.




 
 
 



Against All Enemies
by Richard A. Clarke

The Da Vinci Code
by Dan Brown

Worse Than Watergate
by John W. Dean

Eats, Shoots & Leaves
by Lynne Truss & Lynne Russ

The South Beach Diet Cookbook
by Arthur Agatston

The South Beach Diet
by Arthur Agatston

The Spiral Staircase
by Karen Armstrong

Angels & Demons
by Dan Brown

The Maker's Diet
by Jordan Rubin

South Beach Diet Good Fats/Good Carbs Guide
by Arthur Agatston

South Beach Diet Book by Arthur Agatston
Da Vinci Code by Dan Brown

The Purpose Driven Life by Lemony Snicket

© Copyright 2024 Book Reviews. All rights reserved.