Deliver to Argentina
IFor best experience Get the App
Full description not available
J**N
Excellent balance of technical detail and general overview
This book covers many major protocols. It provides background requirements to each of those protocols (this is important for understanding the big picture of 802.11 networking - otherwise you would be left with puzzle pieces of information).The author creates a lucid description of the flaws of WEP encryption. I have read many websites and lesser books about the flaws of WEP. Now I finally understand those flaws.That chapter, Chapter 6 How 802.11 Works and Why It Doesn't, is akin to J.R.R. Tolkiens chapter on the mines of Moria. Both use verbiage and flow that take the reader upon a journey. Wherein the reader and the book become one united thinking entity. It removes the reader's presence without moving the reader and upon return the reader know's it has been there).This book isn't only about WEP. It covers [probably] every protocol, vulnerability, of 802.11 and rounds it out with some misc stuff in Part III (see TOC for listing).Well written. This book actually is not a stuggle to read. (though I have only read chapters 3-9 and skimmed chapters 1-2). I even enjoy reading it before going to sleep. This goes back to the title of my review. Good balance of general overview and detailed technical information. Or better yet, a good buildup of general overview then followed by a detailed technical description of the topic.I would recommend for intermediate to expert networking folks (devs, testers, project mgrs, admins).
R**H
A great book on .11 security
There are 3 books that are my favorite in the 802.11 arena (among the ones I've come across; I haven't been in touch with the space for the last few years though)1. 802.11 Wireless Networks: The Definitive Guide (O'Reilly Networking) - Matthew Gast2. Real 802.11 Security: Wi-Fi Protected Access and 802.11i - Edney and Arbaugh3. Wi-Foo: The Secrets of Wireless Hacking - Vladimirov, Gavrilenko and MikhailovskyReal 802.11 Security provides a great explanation of WEP, 802.1x (we were doing a RADIUS deployment back then) and WPA (which implements 802.11i). My focus was on chapters 6, 7 and 8, and the final section on the wireless hotspot security. The first part of the book is a primer on security. The book may be a bit dated because you're talking about one of the fastest moving fields at the time it was published. Even if some parts of it have gotten dated, it's still a great book to get a feel of the 802.11 security ecosystem and its evolution.
B**K
excellent book for wireless security
I got this book because i was curious about the psuedo random functions incorporated into wireless technology. This book is incredibly detailed not only on the basic wireless layers for how data is transmitted but also how keys are generated, clients are authenticated and much more. It details all the way up to wpa. If youre interested in the foundations of wireless security, this book provides exceptional detail.
T**E
Great.
In depth and written in a understandable way. Opionions may vary as to what areas it could go into a little more depth in, but is a good starter book.
A**J
Artur's 802.11 Real Security Review
It's really amazing book about 802.11 security. In simple way covers all aspects from WEP to WPA2 and 802.11i. I can suggest to read this book for everyone responsible for projecting, maintnaning and administering wireless networks.
S**T
For the serious reader
This is the fourth book on 802.11 I have read in 8 weeks and for an important reason. The company I work for is moving more and more to wireless to provide connectivity to our customers.In terms of understanding architecture, and the cryptography behind the security protocols this was my favorite book. My favorite chapter was the how WEP works and why it doesn't. The writing was clear and the explanations were accurate. I also loved chapter 15, that equipped me to explain why wireless networks are dangerous beasts with detail.It is a tougher read than some of the other books on the subject, the good news is that you understand the cryptography, the bad news is you have to work through the pages with the crytography.This is a good book and it is well worth the price. Why did I give it 4 stars instead of 5? It could improve in a couple areas. I think it would have been a stronger, more focused work without chapters 2, 3, and 4. Any reader that is willing to wade through the inner workings of TLS, TKIP or WPA doesn't need a security overview. Also, I really wish more effort had been put into chapter 14, Public Wireless Hotspots. It is good, it covers the fundamentals, but I finished the chapter without increasing my understanding of a question every reader of the book will have. Do I dare check my (encrypted) email at a Starbucks or airport hot spot? That said, I think with second edition the authors will have every chance to take the lead in the crowded field of 802.11 books.
Z**E
trés bon contenu
le livre m'a couté 10 euro , malgré l'ancienneté de l'edition , je trouve le livre trés interesant , j'ai appris pas mal de chose sur la sécurité au niveau des réseaux Wifi , je l'ai lu une seul fois mais je compte le lire une deuxième fois pour connaitre le sujet en détails .
M**O
802.11のセキュリティーを知る上でベストな一冊
WPA,802.11iを詳しく知りたいと思っている方への待望の一冊。複雑に絡み合う無線LANセキュリティー技術を明快に解説している。単なるプロトコルの解説にとどまらず、その背景にある設計思想にまで触れられている点などは、本分野の第一線で活躍する著者らならではの内容と言える。一日も早い邦訳が望まれる。
Trustpilot
Hace 3 días
Hace 1 mes