How This Book Is Organized


I’ve divided this book into two parts; each part includes chapters that address a common topic. If you’re relatively new to networking or only have a passing familiarity with TCP/IP and wireless security, I suggest you start in Part I and read the book in order. If you’re in a hurry or concerned that your network may be compromised, you can skip ahead and return to the earlier material later. Here’s how the parts are organized:

  • Part I: Understanding the Threat — Part I introduces wireless technology and basic TCP/IP networking. It introduces the security and safety problems associated with wireless networks and with networking in general.

  • Part II: Protecting Yourself — In Part II, I discuss the steps you can take to secure your network, protect your equipment from viruses, protect and recover your data, and maintain your privacy. If you’re concerned that your network is not secure, and you already have a grasp of the issues presented in Part I, you can start here.

  • Appendixes — The appendixes provide useful resources relating to wireless networks. I’ve also included a glossary of many of the terms I’ve used in this book.

It’s my goal to acquaint you with wireless technology and the related security issues so that you’ll be encouraged to pursue more information and improve your computing knowledge. Wireless networks are here to stay, and I want you to get the most out of them without leaving yourself vulnerable.

Special features and icons

At the beginning of each chapter, you’ll find a short list of the broad topics covered therein. Throughout the text, you’ll encounter icons that I’ve used to bring different topics to your attention. Here’s what each of these icons indicates:

Note 

Note icons provide important related information about a subject.

On The Web 

The On the Web icon provides addresses to online resources about a topic.

Caution 

If I use the Caution icon, I’m warning you about something dangerous where you need to be particularly diligent. I don’t use this icon often, but if you see it please pay close attention to the information.

Cross-Reference 

The Cross-Reference icon directs you to related information elsewhere in the book.

I hope you find this book useful and informative and that it educates you about wireless networking and security and assists you in securing your wireless network.




Caution. Wireless Networking. Preventing a Data Disaster
Caution! Wireless Networking: Preventing a Data Disaster
ISBN: 076457213X
EAN: 2147483647
Year: 2003
Pages: 145

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net