Get full details on major mobile/wireless clients and operating systems--including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security -- the most trusted name in e-security -- this is your one-stop guide to wireless security.
Inhaltsverzeichnis
<H2> Part 1: Introduction to Wireless<H3> 1: Welcome to a Wireless World<H3> 2: Wireless Threats<H3> 3: Introduction to Wireless Security Protocols and Cryptography<H3> 4: Security Considerations for Wireless Devices<H2> Part 2: Wireless Technologies and Applications<H3> 5: Introduction to Cellular Networks<H3> 6: Introduction to Wireless Data Networks<H3> 7: Wireless Standards and Technologies<H2> Part 3: Wireless Deployment Strategies<H3> 8: Implementing Wireless LANs: Security Considerations<H3> 9: Enabling Secure Wireless Access to Data<H3> 10: Real Examples from the Wireless World<H3> 11: The Wireless Future<H3> 12: Assessing Wireless Local Area Networks (LANs)<H3> Appendix A: Glossary of Wireless Terms