IWS - The Information Warfare Site
News Watch Make a  donation to IWS - The Information Warfare Site Use it for navigation in case java scripts are disabled



"The Book of Wi-Fi", John Ross, 2003, 1-886411-45-X, U$29.95/C$44.95

BKBKWIFI.RVW 20030404

"The Book of Wi-Fi", John Ross, 2003, 1-886411-45-X, U$29.95/C$44.95
%A John Ross
%C 555 De Haro Street, Suite 250, San Francisco, CA 94107
%D 2003
%G 1-886411-45-X
%I No Starch Press
%O U$29.95/C$44.95 415-863-9900 fax 415-863-9950 info@nostarch.com
%O http://www.amazon.com/exec/obidos/ASIN/188641145X/robsladesinterne
http://www.amazon.co.uk/exec/obidos/ASIN/188641145X/robsladesinte-21
%O http://www.amazon.ca/exec/obidos/ASIN/188641145X/robsladesin03-20
%P 260 p.
%T "The Book of Wi-Fi"

 

Chapter one provides the usual explanation of 802.11 technologies, right down to the typical non-description of direct sequence spread spectrum. Components and devices, and some reasonable suggestions on evaluation and purchase, are listed in chapter two. Generic planning and basic installation, mostly of access points, is covered in chapter three. Chapter four presents Windows dialogue boxes and configuration programs for the installation of wireless LAN cards. General network setup options are listed in chapter five, and although Windows 98, ME, 2000, and XP are covered, the material has almost nothing to do with wireless technology. Chapter six has a description of the Macintosh AirPort program, while a list of network utilities for Linux is given in chapter seven, and UNIX in eight. Products for PDAs (Personal Digital Assistants) are recorded in chapter nine.

Chapter ten looks at issues of range and power. There is a reasonable overview, but little that is of help to the user. The use of wireless technology as a network repeater, and directional antennae, are discussed in chapter eleven. Twelve examines connecting to a public network. There is a brief description of wardriving and warchalking in chapter thirteen. Chapter fourteen is probably the best item in the book: a series of good recommendations for secure practices. Specific virtual private network programs are listed in chapter fifteen, but there isn't a really solid explanation of the technology. Quick checks for some kinds of troubleshooting are given in chapter sixteen.

The technical level of this work varies from chapter to chapter, but generally it is below the point that a user who would need to get a book on wireless LANs would find useful. This is all right for simple activities, but not much more.

copyright Robert M. Slade, 2003 BKBKWIFI.RVW 20030404