Wireless Operational Security


John W. Rittinghouse, Ph.D., CISM
James F. Ransome, CISM, CISSP
Digital Press is an imprint of Elsevier
AMSTERDAM ¢ BOSTON ¢ HEIDELBERG ¢ LONDON NEW YORK ¢ OXFORD ¢ PARIS ¢ SAN DIEGO SAN FRANCISCO ¢ SINGAPORE ¢ SYDNEY ¢ TOKYO

Digital Press is an imprint of Elsevier
200 Wheeler Road, Burlington, MA 01803, USA
Linacre House, Jordan Hill, Oxford OX2 8DP, UK

Copyright 2004, John W. Rittinghouse and James F. Ransome.

All rights reserved.

No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise , without the prior written permission of the publisher.

Permissions may be sought directly from Elsevier's Science & Technology Rights Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333, e-mail: <permissions@elsevier.com.uk>. You may also complete your request on-line via the Elsevier homepage (http://elsevier.com), by selecting "Customer Support" and then "Obtaining Permissions."

Recognizing the importance of preserving what has been written, Elsevier prints its books on acid-free paper whenever possible.

Library of Congress Cataloging-in-Publication Data

A catalog record for this book is available from the Library of Congress.

ISBN: 155558-317-2

British Library Cataloguing-in-Publication Data

A catalogue record for this book is available from the British Library.

For information on all Digital Press publications visit our website at www.digitalpress.com and www.bh.com/digitalpress

03 04 05 06 07 08 10 9 8 7 6 5 4 3 2 1

Printed in the United States of America

Acknowledgments

From John W. Rittinghouse

As with any book, lots of people in addition to the authors contribute to the great effort that is required to take an idea from scratch and see it become a finished product. In reality, the authors usually depend on quite a few others to help them keep things in order. This is very true in the case of getting this book out the door and into your hands. Many people deserve our gratitude and thanks on this page. My wife, Naree Rittinghouse, is certainly among those I would like to thank for her love and understanding, her encouragement, and most of all, her faith in my work. I would like to thank Dr. Tony Dubendorf for his tireless efforts reviewing each chapter and providing excellent feedback. Shannon Myers deserves a big round of applause for her help; she can almost single-handedly redefine the meaning of the term workaholic. Dr. Bill Hancock is another individual who contributed to the success of this book. His expertise in the security realm knows no bounds, and he worked many late nights reviewing, editing, and validating the work herein to ensure its accuracy and relevancy to our cyberenvironment of today. Finally, I would like to thank all of the folks at Elsevier/Digital Press, especially Theron Shreve, Alan Rose, and Pam Chester, for their continued support of my work.

From James F. Ransome

I would like to thank Dr. John Rittinghouse for giving me the opportunity to collaborate with him on this book. It has been a great pleasure brain- storming with JR throughout the life of this project from conception to the final draft. I am particularly grateful for his editorial patience as we worked through the technical details of the last few chapters. I would also like to thank Dr. Tony Dubendorf and Dr. Bill Hancock for their support in reviewing the earlier drafts of our work. Additional thanks goes to Dr. James Cannady, chairman of my doctoral dissertation committee, for his support and encouragement to take my interest in wireless security to the next level. I want to thank David Croston and Dr. Norbert Schiffner for the use of The PKI Group testing laboratory to test WISDOM.

As a high-tech executive, you are only as good as the people who work with you. I would like to thank the various teams , managers, and individuals who have worked for and with me over the last few years . Thank you, Harry B. and the other men-in-black responsible for setting me on the path of information systems security, wherever you may be. Finally, I would also like to take this opportunity to give special thanks for the patience of my wife, Gail, and her family during the many hours I have spent on this project, and to my children, Steven and Katie, who never doubted that I would make it through.




Wireless Operational Security
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net