Wireless Security: Know It All

· · · · · · · · · · ·
· Newnes
3.9
76 รีวิว
eBook
744
หน้า
มีสิทธิ์
คะแนนและรีวิวไม่ได้รับการตรวจสอบยืนยัน  ดูข้อมูลเพิ่มเติม

เกี่ยวกับ eBook เล่มนี้

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!Communications engineers need to master a wide area of topics to excel. The Wireless Security Know It All covers every angle including Emerging Wireless Technologies and Security Issues, Wireless LAN and MAN Security, as well as Wireless Personal Area Networks. - A 360-degree view from our best-selling authors - Topics include Today's Wireless Technology, Security Definitions and Concepts, and Wireless Handheld devices - The ultimate hard-working desk reference; all the essential information, techniques and tricks of the trade in one volume

การให้คะแนนและรีวิว

3.9
76 รีวิว

เกี่ยวกับผู้แต่ง

Frank Thornton runs his own technology consulting firm, Blackthorn Systems, which specializes in information security and wireless networks. His specialties include wireless network architecture, design, and implementation, as well as network troubleshooting and optimization. An interest in amateur radio helped him bridge the gap between computers and wireless networks. Having learned at a young age which end of the soldering iron was hot, he has even been known to repair hardware on occasion. In addition to his computer and wireless interests, Frank was a law enforcement officer for many years. As a detective and forensics expert he has investigated approximately one hundred homicides and thousands of other crime scenes. Combining both professional interests, he was a member of the workgroup that established ANSI Standard "ANSI/NIST-CSL 1-1993 Data Format for the Interchange of Fingerprint Information."Alan Bensky, MScEE, an electronics engineering consultant with over 25 years of experience in analog and digital design, management, and marketing. Specializing in wireless circuits and systems, Bensky has carried out projects for varied military and consumer applications. He is the author of Short-range Wireless Communication, Second Edition, published by Elsevier, 2004, and has written several articles in international and local publications. He has taught courses and gives lectures on radio engineering topics. Bensky is a senior member of IEEE.Tony Bradley (CISSP-ISSAP) is the Guide for the Internet/Network Security site on About.com, a part of The New York Times Company. He has written for a variety of other Web sites and publications, including BizTech Magazine, PC World, SearchSecurity.com, WindowsNetworking.com, Smart Computing magazine, and Information Security magazine. Tony is a CISSP (Certified Information Systems Security Professional) and ISSAP (Information Systems Security Architecture Professional). He is Microsoft Certified as an MCSE (Microsoft Certified Systems Engineer) and MCSA (Microsoft Certified Systems Administrator) in Windows 2000 and an MCP (Microsoft Certified Professional) in Windows NT. Tony is recognized by Microsoft as an MVP (Most Valuable Professional) in Windows security.On his About.com site, Tony has on average over 600,000 page views per month and over 30,000 subscribers to his weekly newsletter. Tony was also author of Essential Computer Security: Everyone's Guide to E-mail, Internet, and Wireless Security (ISBN: 1597491144).Chris Hurley is a Senior Penetration Tester in the Washington, DC area. He has more than 10 years of experience performing penetration testing, vulnerability assessments, and general INFOSEC grunt work. He is the founder of the WorldWide WarDrive, a four-year project to assess the security posture of wireless networks deployed throughout the world. Chris was also the original organizer of the DEF CON WarDriving contest. He is the lead author of WarDriving: Drive, Detect, Defend (Syngress Publishing, ISBN: 19318360305). He has contributed to several other Syngress publications, including Penetration Tester's Open Source Toolkit (ISBN: 1-5974490210), Stealing the Network: How to Own an Identity (ISBN: 1597490067), InfoSec Career Hacking (ISBN: 1597490113), and OS X for Hackers at Heart (ISBN: 1597490407). He has a BS from Angelo State University in Computer Science and a whole bunch of certifications to make himself feel important.Steve Rackley completed a PhD in Experimental Physics at the Cavendish Laboratory, University of Cambridge. Following a career spanning four decades in the energy industry, gaining experience in some of the main technologies that are key to geological carbon storage, he is currently a technical author, project consultant, and independent researcher into carbon capture and storage, and negative emissions technologies, with a particular interest in ocean based approaches.

ให้คะแนน eBook นี้

แสดงความเห็นของคุณให้เรารับรู้

ข้อมูลในการอ่าน

สมาร์ทโฟนและแท็บเล็ต
ติดตั้งแอป Google Play Books สำหรับ Android และ iPad/iPhone แอปจะซิงค์โดยอัตโนมัติกับบัญชีของคุณ และช่วยให้คุณอ่านแบบออนไลน์หรือออฟไลน์ได้ทุกที่
แล็ปท็อปและคอมพิวเตอร์
คุณฟังหนังสือเสียงที่ซื้อจาก Google Play โดยใช้เว็บเบราว์เซอร์ในคอมพิวเตอร์ได้
eReader และอุปกรณ์อื่นๆ
หากต้องการอ่านบนอุปกรณ์ e-ink เช่น Kobo eReader คุณจะต้องดาวน์โหลดและโอนไฟล์ไปยังอุปกรณ์ของคุณ โปรดทำตามวิธีการอย่างละเอียดในศูนย์ช่วยเหลือเพื่อโอนไฟล์ไปยัง eReader ที่รองรับ