Cisco Wireless LAN Security (Networking Technology) and over one million other books are available for Amazon Kindle. Learn more
Buy Used
$24.97
Condition: Used: Like New
Comment: Like NEW! - Just some small scratches on cover / back from shelf wear. BXTX-6
Access codes and supplements are not guaranteed with used items.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Cisco Wireless LAN Security Hardcover – November 25, 2004

ISBN-13: 061-9472051542 ISBN-10: 1587051540 Edition: 1st

Used
Price: $24.97
7 New from $53.55 31 Used from $0.24
Amazon Price New from Used from
Kindle
"Please retry"
Hardcover
"Please retry"
$53.55 $0.24
Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Best Books of the Year
See the Best Books of 2014
Looking for something great to read? Browse our editors' picks for 2014's Best Books of the Year in fiction, nonfiction, mysteries, children's books, and much more.
NO_CONTENT_IN_FEATURE

Hero Quick Promo
Save up to 90% on Textbooks
Rent textbooks, buy textbooks, or get up to 80% back when you sell us your books. Shop Now

Product Details

  • Hardcover: 456 pages
  • Publisher: Cisco Press; 1 edition (November 25, 2004)
  • Language: English
  • ISBN-10: 1587051540
  • ISBN-13: 978-1587051548
  • Product Dimensions: 7.6 x 1.1 x 9.5 inches
  • Shipping Weight: 2.2 pounds
  • Average Customer Review: 4.9 out of 5 stars  See all reviews (7 customer reviews)
  • Amazon Best Sellers Rank: #2,101,226 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

Krishna Sankar is a distinguished engineer at Cisco Systems, Inc. For the past 20 years, he has held positions in software architecture and development and industrial engineering. Krishna is an author, speaker, and technology evangelist.

Sri Sundaralingam is a technical marketing manager in the Wireless Networking Business Unit at Cisco Systems. Sri has extensive customer contact and is responsible for developing and marketing enterprise and carrier networking solutions using the Cisco Aironet Series of wireless LAN products.

Andrew Balinsky is a network security test engineer at Cisco Systems. His introduction to computer security was through the Air Force Information Warfare Center, where he did everything from tracking hackers to developing security software.

Darrin Miller currently works as a security researcher at Cisco Systems. He has been in the networking industry for more than 15 years and has authored several white papers on network security.

Customer Reviews

4.9 out of 5 stars
5 star
6
4 star
1
3 star
0
2 star
0
1 star
0
See all 7 customer reviews
The configuration samples and examples throughout the book are excellent.
sixmonkeyjungle
Those pages mark specific paragraphs which have been very valuable in customer and support organization presentations.
Phil Livingston
This book is intended for network engineers who design, configure, implement, and maintain secure WLANs.
John Matlock

Most Helpful Customer Reviews

4 of 4 people found the following review helpful By Trevor Chandler on July 20, 2005
Format: Hardcover
The title is definitely in alignment with the content. A basic-to-intermediate discussion of security, as it applies to wireless LANs, is presented in this book. When I completed the book, I certainly had a much better understanding of wireless LAN security fundamentals - both generically and with a Cisco slant. The book has contributions from 4 persons, which may explain the healthy perspective given to the subject of wireless LAN security.

I know the number of chapters of a book can't always tell much of the story, but in the case of the 13 chapters contained in this book - spread out over almost 400 pages - I immediately felt that no single chapter would contain an amount of information that may be overwhelming as far as being able to retain my focus. The 2 final chapters comprised the greatest number of pages for any single chapter, and rightfully so. It would have been a compromise of the completion of the overall material to have limited the number of pages involving configuration examples and deployment scenarios.

I really appreciated chapter 2. This chapter was titled "Basic Security Mechanics and Mechanisms", and the content was just as the title suggested. The subject matter discussed security without any connection to wireless LANs. With "Security" being a complete topic all by itself, it was beneficial to have a little introduction to some generic security fundamentals before blending this topic with wireless networking. If the subject of computer/network security is not your forte, then you'll be served well with this brief exposure.

Chapters 3 and 4 were a welcomed addition because they provided a "warm-up" to wireless networking.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
4 of 4 people found the following review helpful By sixmonkeyjungle on June 19, 2006
Format: Hardcover
The four authors of Cisco Wireless LAN Security do an excellent job of striking a balance between writing concise enough that the book is not overwhelming, but detailed enough for the reader to truly understand the subject matter. Not an easy task.

The book is titled Cisco Wireless LAN Security, which might actually make some people shy away from it, but the Cisco part is a bit of a misnomer. Some of the information and examples are Cisco-centric, but the majority of the information in the book is vendor-neutral and should be understood and applied on just about any wireless network.

The beginning chapters provide an excellent framework for those new to wireless LAN technology, but it quickly moves beyond that to much deeper and more complex subjects within wireless LAN security.

The discussion of wireless vulnerabilities and on wireless security techniques helps you gain an understanding that you can take away from the book and apply to your unique situation. The configuration samples and examples throughout the book are excellent.

I don't recommend that someone new to wireless networks pick this up, but anyone tasked with protecting or securing a wireless LAN should definitely use this book as a resource.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By W Boudville HALL OF FAMETOP 1000 REVIEWERVINE VOICE on May 29, 2006
Format: Hardcover
The title explicitly says Cisco, and indeed there is a lot of material enclosed that is specific to how Cisco implements its wireless routers. But you could plausibly also use this book as a good guideline to general purpose wireless security.

The authors have gone to some length to explain the general principles of 802.11*. In and of itself, this will be useful to some readers, for 802.11 is now a huge set of complex standards. With the official documentation being quite turgid prose, though necessary of course. For clarity, this book is a good and far more understandable alternative.

The text also goes into associated topics, like the encryption protocols associated with 802.11. Plus, and this is important, it describes third party, often open source, tools that can be used to sniff for insecure networks. Tools like Kismet or Wellenreiter, where the latter is meant for wardriving. One of the first things you should do is download and use one of these tools [or even several of them] against your wireless net, if it is already running. Better that you discover any weaknesses in it, than others do so.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
4 of 5 people found the following review helpful By Phil Livingston on October 10, 2005
Format: Hardcover
OK, the title does indeed tell a great deal about this particular book: However, the "Cisco" tag may be misleading. Cisco WLAN Equipment and even some terminology is used throughout this text. With a Vendor's badge on the cover and name in the title it prepared me for an extremely biased volume of configurations and presentations on Cisco specific technology. This text greatly exceeded a book with that good but narrower approach. A great plus of this particular text is the detail it provides on technology and design criteria which is applicable to WLAN security regardless of technology vendor. It has taken the place of my best vendor agnostic text as the first reference I grab.

Kirshna, Sri, Andrew, and Darrin have delivered the subtitle "Expert guidance for securing your 802.11 networks" in 13 chapters. Vast majority of their 395 pages of text and diagrams are not only applicable but extremely valuable to anyone charged with designing, implementing, and administrating WLANs in today's security conscious environment.

Guidance on secure WLAN design is far more than delivery of some cookie cutter equipment configs. The authors obviously recognized this and exceeded this reader's expectation. Their guidance was achieved by delivering sufficient detail on all the technologies and interdependencies that are required to deliver WLAN Security. They did not pave a single configuration which would have had too narrow an audience. They provided the foundation which enables, even seasoned WLAN engineers, to deliver for a wide variety of business requirements.

My copy has loads of dog-eared pages. Those pages mark specific paragraphs which have been very valuable in customer and support organization presentations.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

What Other Items Do Customers Buy After Viewing This Item?