Maximum Wireless Security

Front Cover
Sams Publishing, 2003 - Computers - 390 pages
1 Review
0672324881.ld A detailed guide to wireless vulnerabilities, written by authors who have first-hand experience with wireless crackers and their techniques. Wireless technology and Internet security are the two fastest growing technology sectors. Includes a bonus CD packed with powerful free and demo tools to audit wireless networks. Reviewed and endorsed by the author of WEPCrack, a well-known tool for breaking 802.11 WEP encryption keys. Maximum Wireless Securityis a practical handbook that reveals the techniques and tools crackers use to break into wireless networks, and that details the steps network administrators need to take to secure their systems. The authors provide information to satisfy the experts hunger for in-depth information with actual source code, real-world case studies, and step-by-step configuration recipes. The book includes detailed, hands-on information that is currently unavailable in any printed text -- information that has been gleaned from the authors work with real wireless hackers ("war drivers"), wireless security developers, and leading security experts. Cyrus Peikariis the chief technical officer for VirusMD Corporation and has several patents pending in the anti-virus field. He has published several consumer security software programs, including an encrypted instant messenger, a personal firewall, a content filter and a suite of network connectivity tools. He is a repeat speaker at Defcon. Seth Fogie, MCSE,is a former United State Navy nuclear engineer. After retiring, he has worked as a technical support specialist for a major Internet service provider. He is currently the director of engineering at VirusMD Corporation, where he works on next-generation wireless security software. He has been invited to speak at Defcon in 2003.
 

What people are saying - Write a review

User Review - Flag as inappropriate

L/D 621.396.4 PEI

Contents

III
5
IV
6
V
7
VII
9
IX
13
X
14
XI
15
XII
16
CLXVIII
168
CLXIX
169
CLXX
172
CLXXI
178
CLXXII
179
CLXXV
180
CLXXVI
186
CLXXX
189

XIV
18
XV
19
XVI
20
XVII
21
XX
22
XXI
23
XXII
24
XXIII
25
XXIV
26
XXV
27
XXVI
28
XXVIII
29
XXX
30
XXXII
31
XXXIV
32
XXXVIII
33
XXXIX
34
XLI
35
XLII
36
XLIII
39
XLIV
41
XLV
42
XLVIII
43
XLIX
45
LI
48
LII
49
LIII
53
LVI
55
LVIII
56
LIX
57
LX
59
LXII
60
LXIV
61
LXVI
62
LXVII
63
LXVIII
64
LXIX
65
LXX
66
LXXI
68
LXXIII
69
LXXV
70
LXXVI
71
LXXVII
72
LXXVIII
74
LXXIX
75
LXXX
76
LXXXI
77
LXXXII
78
LXXXIII
79
LXXXIV
82
LXXXV
83
LXXXVI
85
LXXXVIII
86
XC
87
XCIV
88
XCV
89
XCVII
90
XCIX
92
C
93
CII
94
CIV
95
CV
96
CVIII
97
CXI
99
CXIV
101
CXVI
102
CXIX
103
CXXI
105
CXXIII
106
CXXIV
107
CXXV
108
CXXVI
109
CXXIX
111
CXXX
113
CXXXI
114
CXXXII
115
CXXXIV
117
CXXXV
118
CXXXVI
120
CXXXVII
122
CXXXVIII
123
CXXXIX
125
CXL
129
CXLI
136
CXLII
142
CXLIII
144
CXLIV
147
CXLV
148
CXLVI
151
CXLVII
152
CXLVIII
153
CXLIX
154
CL
155
CLI
156
CLII
157
CLIII
158
CLIV
160
CLVI
161
CLVII
162
CLX
163
CLXII
165
CLXIII
167
CLXXXII
196
CLXXXVI
197
CLXXXVII
199
CLXXXVIII
202
CXC
203
CXCII
204
CXCIV
205
CXCV
206
CXCVI
207
CXCVII
208
CXCVIII
209
CC
210
CCIII
214
CCVII
215
CCVIII
216
CCX
220
CCXI
222
CCXII
223
CCXIII
225
CCXV
226
CCXVII
227
CCXIX
228
CCXXI
229
CCXXII
230
CCXXIV
234
CCXXVI
240
CCXXVIII
241
CCXXIX
242
CCXXX
243
CCXXXI
246
CCXXXII
247
CCXXXIII
248
CCXXXIV
249
CCXXXV
250
CCXXXVI
255
CCXXXVIII
256
CCXXXIX
257
CCXL
259
CCXLI
261
CCXLII
262
CCXLV
265
CCXLVI
268
CCXLVII
270
CCL
272
CCLI
273
CCLIV
274
CCLV
275
CCLVII
276
CCLIX
278
CCLXI
279
CCLXII
280
CCLXIII
281
CCLXIV
282
CCLXV
283
CCLXVII
284
CCLXVIII
285
CCLXX
286
CCLXXIV
287
CCLXXVIII
288
CCLXXIX
290
CCLXXX
291
CCLXXXI
292
CCLXXXII
293
CCLXXXIV
294
CCLXXXVII
295
CCLXXXVIII
298
CCXC
299
CCXCI
300
CCXCV
301
CCXCVII
302
CCXCVIII
303
CCCI
305
CCCIV
306
CCCVII
307
CCCIX
308
CCCXI
309
CCCXIII
310
CCCXV
311
CCCXVII
313
CCCXIX
314
CCCXXII
316
CCCXXIII
317
CCCXXVII
318
CCCXXVIII
319
CCCXXX
320
CCCXXXIII
322
CCCXXXVI
323
CCCXXXVIII
324
CCCXXXIX
325
CCCXL
326
CCCXLI
327
CCCXLII
328
CCCXLIII
331
CCCXLIV
333
CCCXLV
337
CCCXLVI
359
CCCXLVIII
360
CCCXLIX
364
CCCL
365
CCCLI
367
Copyright

Other editions - View all

Common terms and phrases

References to this book

About the author (2003)

Dr. Cyrus Peikari finished his formal training with honors in electrical engineering at Southern Methodist University in 1991. For eight years Dr. Peikari taught advanced mathematics at the SMU Learning Enhancement Center in Dallas, Texas. He has also worked as a telecommunications software research and development engineer for Alcatel. Dr. Peikari has developed several award-winning security software programs. He also co-founded DallasCon, the largest annual wireless security conference in the Southwest. You can reach him at cyrus@virusmd.com.

Seth Fogie is a former United States Navy nuclear engineer. After retiring from the Navy, Mr. Fogie worked as a technical support specialist for a major Internet service provider, during which time he earned his MCSE. Currently, Mr. Fogie is director of engineering at VirusMD Wireless Security, where he develops next-generation mobile security software.

Brett L. Neilson is a network and system engineer with a strong background in the wireless industry. Mr. Neilson has previously worked for Verizon Wireless as a Senior Systems Administrator and RF Field Technician. While at Verizon he worked to develop, deploy, and maintain its national infrastructure. Currently Mr. Neilson works for a leading infosec corporation. As an FCC licensed amateur radio operator, he has worked with various government agencies providing communication assistance and coordination. His broad range of computer and RF skills has led him to perform groundbreaking research in practical wireless security. Mr. Neilson also teaches a series of review courses for the Wireless Security Expert Certification (WSEC).

Sten Lannerstrom is product portfolio manager at SmartTrust, a provider of infrastructure software for securing and managing mobile services and devices. Mr. Lannerstrom joined SmartTrust in 1997 (at that time iD2 Technologies) and has more than 22 years of experience in the area of information technology. Mr. Lannerstrom oversees SmartTrust's wireless security portfolio, including the use of smart cards, wireless devices, digital certificates, and biometrics. He holds the CISA (Certified Information Systems Auditor) accreditation.

Bibliographic information