PRO+ Premium Content/Information Security

Thank you for joining!
Access your Pro+ Content below.
April 2002

Secure reads: Wireless Security

In the computing industry, talk of wireless security is usually limited to a few specific topics: encryption, wireless LANs, WAP or maybe even Bluetooth. These are the subjects you'd expect to see covered by a book titled Wireless Security. This book, however, takes a far more comprehensive approach. Written more for telecommunications professionals than network admins, this book covers a broad range of wireless security topics, including cellphone networks, speech cryptology, satellite communication links and voice over IP. It even includes details on how to design more secure communications hardware using application-specific integrated circuits (ASICs) and field-programmable gate arrays (FPGAs). Wireless Security reads a lot like a college textbook, which is both a good and a bad thing. It's very detailed, with each chapter containing an extensive list of footnotes and citations. The authors take the time to explain the background of most subjects, so a reader encountering a technology for the first time can easily follow the...

Access this PRO+ Content for Free!

Features in this issue

  • Becky Bace: The IDS security den mother

    by  Richard Thieme

    Former NSA employee and "den mother of computer security" Becky Base built an impressive and successful career that has undeniably influenced the industry.

  • Four computer forensics books worth investigating

    by  Gary C. Kessler & Michael Schirling

    Check out four computer forensics books that can help you learn the ins and outs of computer forensics technology and laws in place to manage cybercrime.

  • Do's and don'ts of building a forensics workstation

    by  Elizabeth A. Genco

    Elizabeth Genco explains the pros and cons of building a forensics workstation from scratch. Read now to learn what forensic tools are beneficial and which ones aren't.

Columns in this issue

  • Secure reads: Wireless Security

    by  Randall K. Nichols & Panos C. Lekkas

    Wireless Security offers a detailed overview of wireless security topics and covers big-picture characteristics of today's wireless security technologies.

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

-ADS BY GOOGLE

Close