one is an introduction to wireless network security.
is supposed to be an opening to wireless networking,
but is basically
a list of common protocols. Wireless threat analysis,
in chapter two,
is an unstructured list of miscellaneous threats. A facile
of blackhat communities, some intrusion tools, and a
insider attacks (without mention of any relevance to
networking) is in chapter three.
two looks at the components of network security. Chapter
presents us with random security factors in place of
network security model. Network intrusion protection
is said, in
chapter five, to consist of firewalls and other tools
application to wireless topologies. In regard to network
detection, some of the material in chapter six is pointless
expect an intrusion detection system (IDS) to protect
attacks?) and some is wrong (a honeypot would only act
as an intrusion
detection sensor by chance). Chapter seven has sound
host-based IDS and some advice on hardening systems,
networking is almost unmentioned. Virtual private networks
discussed in chapter eight, while nine turns to logging
three reviews wireless security components. Chapter
a configuration for basic level wireless security. Secure
authentication, in chapter eleven, has at least some
wireless. The examination of encryption, in chapter twelve,
protocols without much discussion of concepts, and records
of the systems without providing details. Chapter thirteen
considers the placement of wireless access points, from
rather than security perspective.
four contemplates the integration of wireless security
network security process. Chapter fourteen registers
some tools for
the logging of wireless security events. A number of
consider for a wireless security policy are enumerated
fifteen. Various sniffing and cracking tools are described
sixteen. Chapter seventeen isn't really clear as to its
seems to be talking about management of device configuration.
five lists products, rather than the promised security
We look at Cisco and LEAP, RADIUS, IPSec, secure wireless
access, and secure wireless point-to-point in chapters
as bad as "Wireless Security" (cf.
BKWRLSSC.RVW), by Randall
K. Nichols and Panos C. Lekkas, this work is only on
a par with
bloated exercises such as Jahanzeb Khan and Anis Khwaja's "Building
Secure Wireless Networks with 802.11" (cf. BKBSWNW8.RVW)
comprehensive list of topics (but missing details) in "Designing
Wireless Network" (cf. BKDSWLNT.RVW) by Jeffrey
Wheat et al.
Certainly "Wireless Security Essentials" by
Russell Dean Vines (cf.
BKWLSCES.RVW) is far superior to the Carter and Shumway
copyright Robert M. Slade, 2003 BKWLSCEE.RVW 20031019