Flylib.com
Wireless Security and Privacy: Best Practices and Design Techniques
Wireless Security and Privacy: Best Practices and Design Techniques
ISBN: 0201760347
EAN: 2147483647
Year: 2002
Pages: 73
Authors:
Tara M. Swaminatha
,
Charles R. Elden
BUY ON AMAZON
Copyright
Foreword
Preface
The Advantages of Reading This Book
About the Authors
Acknowledgments
Part I: Establish a Foundation
Chapter 1. Wireless Technologies
An Introduction to Wireless Architecture
Usage Models
Devices
Network Arrangements and Technologies
Case Studies
Chapter 2. Security Principles
Security Principles
Development and Operation Principles
Management Principles
The Security Analysis ProcessI-ADD
The Foundation
Part II: Know Your System
Chapter 3. Technologies
802.11 and 802.11b
Bluetooth
WAP
Chapter 4. Devices
Personal Digital Assistants
Palm OS Devices
Pocket PC Devices
BlackBerry (RIM 950 and 957)
Chapter 5. Languages
Wireless Application Protocol (WAP)
J2ME
Part III: Protect Your System
Chapter 6. Cryptography
Applied Cryptography Overview
Symmetric Cryptography
Asymmetric Cryptography
Common Problems
Choices
Key Points
Chapter 7. COTS
COTS versus Custom Software
Virtual Private Network (VPN)
Tunneling
IPSec
SmartCards
Biometric Authentication
Chapter 8. Privacy
The Online Privacy Debate in the Wired World
Privacy in the Wireless World
The Players
Related Privacy Legislation and Policy
Location-Based Marketing and Services and GPS
The Middle Ground Answer
Progress in the Wired World
Part IV: I-ADD
Chapter 9. Identify Targets and Roles
Identify Targets
Identify Roles
Chapter 10. Analyze Attacks and Vulnerabilities
Known Attacks
Vulnerabilities and Theoretical Attacks
Chapter 11. Analyze Mitigations and Protections
Protecting the Wireless Device
Protecting the Physical Interface
Prioritizing
Building TrustApplication Security
Chapter 12. Define and Design
The Case Studies Revisited
Just the Beginning
Afterword: The Future of Wireless Security
Bibliography
Wireless Security and Privacy: Best Practices and Design Techniques
ISBN: 0201760347
EAN: 2147483647
Year: 2002
Pages: 73
Authors:
Tara M. Swaminatha
,
Charles R. Elden
BUY ON AMAZON
CompTIA Project+ Study Guide: Exam PK0-003
Assessment Test
IT Project Management Overview
Project Initiation
Cost Planning
Other Planning Processes
High-Speed Signal Propagation[c] Advanced Black Magic
The Future of On-Chip Interconnections
LVDS Signaling
Finished Core Specifications
Extra Fries, Please
Power Supply Filtering for Clock Sources, Repeaters, and PLL Circuits
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 2. Find Yourself (and Others) on Google Maps
Hack 22. Witness the Effects of a Nuclear Explosion
Hack 24. Search for Events by Location
Hack 51. Make a Fullscreen Map the Right Way
Hack 59. Show Lots of StuffQuickly
Ruby Cookbook (Cookbooks (OReilly))
Validating an Email Address
Multiplying Matrices
Preventing SQL Injection Attacks
Making an HTTPS Web Request
Searching the Web with Googles SOAP Service
802.11 Wireless Networks: The Definitive Guide, Second Edition
Challenges for the MAC
Contention-Based Access Using the DCF
Wired Equivalent Privacy (WEP)
Association
Windows XP
Comparing, Designing, and Deploying VPNs
Deploying MPLS Layer 3 VPNs
Advantages and Disadvantages of IPsec Site-to-Site VPNs
Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs
Benefits and Drawbacks of L2TP Remote Access VPNs
Deploying SSL VPNs (WebVPN) on the ASA 5500
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies