I’ve divided this book into two parts; each part includes chapters that address a common topic. If you’re relatively new to networking or only have a passing familiarity with TCP/IP and wireless security, I suggest you start in Part I and read the book in order. If you’re in a hurry or concerned that your network may be compromised, you can skip ahead and return to the earlier material later. Here’s how the parts are organized:
Part I: Understanding the Threat — Part I introduces wireless technology and basic TCP/IP networking. It introduces the security and safety problems associated with wireless networks and with networking in general.
Part II: Protecting Yourself — In Part II, I discuss the steps you can take to secure your network, protect your equipment from viruses, protect and recover your data, and maintain your privacy. If you’re concerned that your network is not secure, and you already have a grasp of the issues presented in Part I, you can start here.
Appendixes — The appendixes provide useful resources relating to wireless networks. I’ve also included a glossary of many of the terms I’ve used in this book.
It’s my goal to acquaint you with wireless technology and the related security issues so that you’ll be encouraged to pursue more information and improve your computing knowledge. Wireless networks are here to stay, and I want you to get the most out of them without leaving yourself vulnerable.
At the beginning of each chapter, you’ll find a short list of the broad topics covered therein. Throughout the text, you’ll encounter icons that I’ve used to bring different topics to your attention. Here’s what each of these icons indicates:
Note | Note icons provide important related information about a subject. |
On The Web | The On the Web icon provides addresses to online resources about a topic. |
Caution | If I use the Caution icon, I’m warning you about something dangerous where you need to be particularly diligent. I don’t use this icon often, but if you see it please pay close attention to the information. |
Cross-Reference | The Cross-Reference icon directs you to related information elsewhere in the book. |
I hope you find this book useful and informative and that it educates you about wireless networking and security and assists you in securing your wireless network.