Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security
()
About this ebook
Finally--a single volume guide to really effective security for both voice and data wireless networks!
More and more data and voice communications are going via wireless at some point between the sender and intended recipient. As a result, truly "bulletproof" wireless security is now more than a desirable feature--instead, it's a necessity to protect essential personal and business data from hackers and eavesdroppers.
In this handy reference, Praphul Chandra gives you the conceptual and practical tools every RF, wireless, and network engineer needs for high-security wireless applications.
- Inside this book you'll find coverage of these essential topics: + Cryptographic protocols used in wireless networks. + Key-based protocols, including key exchange and authentication techniques + Various types of wireless network attacks, including reflection, session hijacks, and Fluhrer-Mantin-Shamir (FMS) attacks. + Encryption/decryption standards and methods. + Multi-layered security architectures. + Secure sockets layer (SSL) and transport layer security (TLS) protocols. + Cellular telephone network architectures and their vulnerabilities. + Modulation techniques, such as direct-sequence spread spectrum (DSSS) and orthogonal frequency division multiplexing (OFDM)
- And you'll also find coverage on such cutting-edge topics as security techniques for ad hoc networks and protecting Bluetooth networks. If you're serious about wireless security, then this title belongs on your reference bookshelf!
Read more from Praphul Chandra
Wi-Fi Telephony: Challenges and Solutions for Voice over WLANs Rating: 5 out of 5 stars5/5
Related to Bulletproof Wireless Security
Related ebooks
Coding for Penetration Testers: Building Better Tools Rating: 0 out of 5 stars0 ratingsEleventh Hour Network+: Exam N10-004 Study Guide Rating: 0 out of 5 stars0 ratingsThe Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics Rating: 4 out of 5 stars4/5Inside Radio: An Attack and Defense Guide Rating: 0 out of 5 stars0 ratingsHandbook on Securing Cyber-Physical Critical Infrastructure Rating: 0 out of 5 stars0 ratingsBotnets: The Killer Web Applications Rating: 5 out of 5 stars5/5Stealing The Network: How to Own the Box Rating: 4 out of 5 stars4/5Open Source Fuzzing Tools Rating: 0 out of 5 stars0 ratingsStealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD Rating: 0 out of 5 stars0 ratingsSeven Deadliest Unified Communications Attacks Rating: 0 out of 5 stars0 ratingsBuffer Overflow Attacks: Detect, Exploit, Prevent Rating: 4 out of 5 stars4/5Ethereal Packet Sniffing Rating: 0 out of 5 stars0 ratingsMeeting People via WiFi and Bluetooth Rating: 0 out of 5 stars0 ratingsSyngress Force Emerging Threat Analysis: From Mischief to Malicious Rating: 0 out of 5 stars0 ratingsHacking Wireless Access Points: Cracking, Tracking, and Signal Jacking Rating: 0 out of 5 stars0 ratingsHack the Airwaves: Advanced BLE Exploitation Techniques Rating: 0 out of 5 stars0 ratingsPlacing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects Rating: 0 out of 5 stars0 ratingsWireless Operational Security Rating: 0 out of 5 stars0 ratingsMalware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware Rating: 0 out of 5 stars0 ratingsAVIEN Malware Defense Guide for the Enterprise Rating: 0 out of 5 stars0 ratingsCyber Reconnaissance, Surveillance and Defense Rating: 4 out of 5 stars4/5Beginning Backbone.js Rating: 3 out of 5 stars3/5Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-' Rating: 5 out of 5 stars5/5Asterisk Hacking Rating: 0 out of 5 stars0 ratingsSeven Deadliest USB Attacks Rating: 0 out of 5 stars0 ratingsLighttpd Rating: 4 out of 5 stars4/5Overview of Some Windows and Linux Intrusion Detection Tools Rating: 0 out of 5 stars0 ratingsPro Cryptography and Cryptanalysis with C++20: Creating and Programming Advanced Algorithms Rating: 0 out of 5 stars0 ratingsCyber Combat: Learn to Defend Against Cyber Attacks and Corporate Spying Rating: 0 out of 5 stars0 ratings
Electrical Engineering & Electronics For You
Practical Electrical Wiring: Residential, Farm, Commercial, and Industrial Rating: 4 out of 5 stars4/5Electrical Engineering 101: Everything You Should Have Learned in School...but Probably Didn't Rating: 5 out of 5 stars5/5Beginner's Guide to Reading Schematics, Third Edition Rating: 0 out of 5 stars0 ratings2022 Adobe® Premiere Pro Guide For Filmmakers and YouTubers Rating: 5 out of 5 stars5/5How to Diagnose and Fix Everything Electronic, Second Edition Rating: 4 out of 5 stars4/5Electrical Engineering Rating: 4 out of 5 stars4/5Electrician's Pocket Manual Rating: 0 out of 5 stars0 ratingsThe Basics of Electronics Rating: 0 out of 5 stars0 ratingsBeginner's Guide to Reading Schematics, Fourth Edition Rating: 4 out of 5 stars4/5Electrical Engineering: Know It All Rating: 4 out of 5 stars4/5The Homeowner's DIY Guide to Electrical Wiring Rating: 5 out of 5 stars5/5Basic Electricity Rating: 4 out of 5 stars4/5Electronics Explained: Fundamentals for Engineers, Technicians, and Makers Rating: 5 out of 5 stars5/5Electricity for Beginners Rating: 5 out of 5 stars5/5Schaum's Outline of Basic Electricity, Second Edition Rating: 5 out of 5 stars5/5DIY Drones for the Evil Genius: Design, Build, and Customize Your Own Drones Rating: 4 out of 5 stars4/5Soldering electronic circuits: Beginner's guide Rating: 4 out of 5 stars4/5Solar & 12 Volt Power For Beginners Rating: 4 out of 5 stars4/5Electric Circuits Essentials Rating: 5 out of 5 stars5/5Upcycled Technology: Clever Projects You Can Do With Your Discarded Tech (Tech gift) Rating: 5 out of 5 stars5/5Electronics Engineering Rating: 0 out of 5 stars0 ratingsRaspberry Pi Electronics Projects for the Evil Genius Rating: 3 out of 5 stars3/5Operational Amplifier Circuits: Analysis and Design Rating: 5 out of 5 stars5/5Understanding Electricity Rating: 4 out of 5 stars4/5Off-Grid Projects: Step-by-Step Guide to Building Your Own Off-Grid System Rating: 0 out of 5 stars0 ratingsDIY Lithium Battery Rating: 3 out of 5 stars3/5Basic Electronics: Book 2 Rating: 5 out of 5 stars5/5Programming Arduino: Getting Started with Sketches Rating: 4 out of 5 stars4/5Forrest Mims Engineer's Notebook Rating: 4 out of 5 stars4/5
Reviews for Bulletproof Wireless Security
0 ratings0 reviews