登 录
註 冊
论坛
微波仿真网
注册
登录论坛可查看更多信息
微波仿真论坛
>
微波电子书免费下载
>
Wireless Security and Privacy - Best Practices and Design T ..
发帖
回复
1342
阅读
4
回复
[其它]
Wireless Security and Privacy - Best Practices and Design Techniques
离线
tensor
新的一年开始了!
UID :2
注册:
2006-10-04
登录:
2025-09-29
发帖:
4229
等级:
值班管理员
0楼
发表于: 2008-10-11 16:53:05
Wireless Security and Privacy - Best Practices and Design Techniques
TU[f"!z^
P?]q*KViM
The title of this week's tip is actually the title of an excellent book by Tara M. Swaminatha and Charles R. Elden (Addison-Wesley, 2002, ISBN: 0201760347). Although it's a bit dated because it omits coverage of 802.11g and 802.11x security issues (more on those topics in tips to come), it's nevertheless a worthwhile addition to anybody's wireless library because it deals with 802.11b (still the most common type of wireless networking technology in use) and because of its simple, straightforward coverage of key topics in wireless security and in designing more secure wireless networks. The book also covers BlueTooth and the Wireless Application Protocol (WAP) in some detail.
Txoc
The book begins with an overview of these key wireless technologies, then goes on to explore typical wireless networking setups. These include so-called personal area networks (PANs, usually deployed in small-scale home settings), local area networks (usually abbreviated as WLANs, for wireless LANs, to distinguish them from wired networks), and wide area networks (WANs). Next, the book moves on to examine a series of four case studies with a primary emphasis on WLANs, including scenarios in a home, an office complex, a university campus and a hospital.
_}JygOew
In explaining and exploring wireless security, the authors stress security as an ongoing process that must start with system design, and carry through pilot test, deployment, maintenance (and ultimately, migration to some successor). They also do a great job of covering key security principles to provide readers with the vocabulary and techniques necessary to assess risk and establish proper security implementations. Along the way, they provide cogent and succinct coverage of key security topics that include AAA (authentication, authorization, and accounting/auditing), access controls, confidentiality, integrity, privacy, and non-repudiation.
UK&E#i
They also delve into wireless networking devices and configurations, cryptography, and privacy topics. The book concludes with a series of four chapters on what the authors call the I-ADD security analysis process:
-P'>~W,~
I
dentify targets and roles
A
nalyze known attacks, vulnerabilities, and potential attacks to avoid or protect yourself from them
D
efine a security strategy, establishing trade-offs among security, functionality, and management as your risk analysis requires
D
esign security into your syste ..
=WDf [?ED
m^]/ /j
未注册仅能浏览
部分内容
,查看
全部内容及附件
请先
登录
或
注册
附件:
[0201760347]Wireless Security and Privacy - Best Practices and Design Techniques.[bbs.rfeda.cn].part1.rar
(1000 K) 下载次数:22
附件:
[0201760347]Wireless Security and Privacy - Best Practices and Design Techniques.[bbs.rfeda.cn].part2.rar
(436 K) 下载次数:13
共
条评分
本人从事微波行业研究和教学。丰富的硬件资源和微波团队可
承接各类与微波相关的项目 QQ:546874678 EMAIL:rfeda@126.com
离线
hengyi1211
UID :23957
注册:
2008-12-31
登录:
2009-01-01
发帖:
27
等级:
仿真新人
1楼
发表于: 2008-12-31 19:46:57
[post][/post]微波系统的基础知识简装本
共
条评分
离线
lsdhappy
UID :27994
注册:
2009-03-21
登录:
2012-06-20
发帖:
202
等级:
仿真三级
2楼
发表于: 2009-03-27 19:33:17
kankan
共
条评分
离线
lsdhappy
UID :27994
注册:
2009-03-21
登录:
2012-06-20
发帖:
202
等级:
仿真三级
3楼
发表于: 2009-03-28 12:28:12
ding
共
条评分
离线
whynot910
UID :36184
注册:
2009-06-28
登录:
2025-09-30
发帖:
17499
等级:
RFEDA终级会员
4楼
发表于: 2016-08-12 17:54:02
无线安全确实比较重要,对于无线通信
共
条评分
发帖
回复