Previous Page
Next Page

SUMMARY

Demand for new features and capabilities fuels the growth of wireless networking technologies. Old problems are dealt with and new ones appear. Keeping up-to-date with the latest developments can be a daunting task.

This book will help IT professionals understand the new types of threats made possible with wireless technologies, give them the means of identifying the threats, and provide the remediation processes to protect important financial and intellectual assets. One of the goals of this book is to give you a basic understanding of the concepts underlying wireless technology.

Various topics will be covered in this book that will help you gain a better understanding of wireless security: the effect of antenna design on radio transmissions, key scheduling methods of encryption algorithms, tools used to probe wireless devices and networks, and methods that can be used to help secure the wireless network infrastructure.

As wireless technology improves and the hardware implementing the technology becomes more affordable, the deployment of wireless equipment will proliferate. The added convenience and accessibility will attract many hostile users as well. By understanding the basic concepts behind wireless technologies and the relevant security issues, IT professional will have the means necessary to secure their critical network infrastructure. This book will help IT professionals secure wireless infrastructures by providing the knowledge necessary to evaluate, test, and deploy wireless equipment.


Previous Page
Next Page