- Paperback: 480 pages
- Publisher: Addison-Wesley Professional; 1 edition (July 25, 2003)
- Language: English
- ISBN-10: 0321136209
- ISBN-13: 978-0321136206
- Product Dimensions: 6.9 x 1 x 9.2 inches
- Shipping Weight: 1.5 pounds (View shipping rates and policies)
- Average Customer Review: 20 customer reviews
- Amazon Best Sellers Rank: #1,264,905 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Real 802.11 Security: Wi-Fi Protected Access and 802.11i 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
Customers who viewed this item also viewed
Customers who bought this item also bought
From the Back Cover
" Real 802.11 Security provides clear descriptions of current and emerging security techniques. The authors handle complex topics nicely, and offer significant clarification of IEEE draft standards."
--Russ Housley, IETF Security Area Director and founder of Vigil Security, LLC
"This is certainly the definitive text on the internals of 802.11 security!"
--John Viega, founder and chief scientist, Secure Software, Inc.
"This book keeps the exposition as straightforward as possible and enables you to cut through the maze of acronyms, hacking tools, rumored weaknesses, and vague vendor security claims to make educated security decisions when purchasing or deploying WLAN."
--Simon Blake-Wilson, Director of Information Security, BCI
Business professionals and advanced home users are captivated by the convenience of working on wireless networks. But how can privacy and security be maintained effectively? Real 802.11 Security describes an entirely new approach to wireless LAN security based on the latest developments in Wi-Fi technology. This is the book that will show you how to establish real security within your Wi-Fi LAN.
Recent developments in Wi-Fi security achieve what no amount of reconfiguration can do: They solve the problem at the source. Wi-Fi Protected Access (WPA) repairs weaknesses in existing Wi-Fi systems and is designed to allow software upgrades. The upcoming 802.11i standard will offer a much higher level of security than previously offered and will provide flexible, extremely secure solutions for future products.
Real 802.11 Security addresses the theory, implementations, and reality of Wi-Fi security. It provides an overview of security issues, explains how security works in Wi-Fi networks, and explores various security and authentication protocols. The book concludes with an in-depth discussion of real-world security issues and attack tools.
Written by two experts in wireless security, Jon Edney and William Arbaugh, this book shows you how to stay informed and aware when making security decisions, and what steps you can take to implement the most effective, proactive wireless security now and in the future.
About the Author
Jon Edney specializes in wireless networking and is a key contributor to the development of IEEE 802.11 systems. As a member of the technology consultancy Symbionics Networks, he deployed the first low-cost 802.11 designs. In 1996, Edney cofounded InTalk, Inc., the first IEEE 802.11 company to develop WLAN access points. After InTalk was acquired by Nokia Corporation, he focused on the application of Wi-Fi to public access networks. He is an active member of the IEEE 802.11 TGi security group.
William A. Arbaugh is an assistant professor of computer science at the University of Maryland in College Park, where he conducts research in information systems security. Arbaugh served as a senior computer scientist for the National Security Agency's Office of Research and Technology, and then as senior technical advisor for the Office of Advanced Network Programs. He has many publications to his credit and has delivered papers at security-related conferences such as IEEE, SANS, USENIX, and Comdex.
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
1. 802.11 Wireless Networks: The Definitive Guide (O'Reilly Networking) - Matthew Gast
2. Real 802.11 Security: Wi-Fi Protected Access and 802.11i - Edney and Arbaugh
3. Wi-Foo: The Secrets of Wireless Hacking - Vladimirov, Gavrilenko and Mikhailovsky
Real 802.11 Security provides a great explanation of WEP, 802.1x (we were doing a RADIUS deployment back then) and WPA (which implements 802.11i). My focus was on chapters 6, 7 and 8, and the final section on the wireless hotspot security. The first part of the book is a primer on security. The book may be a bit dated because you're talking about one of the fastest moving fields at the time it was published. Even if some parts of it have gotten dated, it's still a great book to get a feel of the 802.11 security ecosystem and its evolution.
The author creates a lucid description of the flaws of WEP encryption. I have read many websites and lesser books about the flaws of WEP. Now I finally understand those flaws.
That chapter, Chapter 6 How 802.11 Works and Why It Doesn't, is akin to J.R.R. Tolkiens chapter on the mines of Moria. Both use verbiage and flow that take the reader upon a journey. Wherein the reader and the book become one united thinking entity. It removes the reader's presence without moving the reader and upon return the reader know's it has been there).
This book isn't only about WEP. It covers [probably] every protocol, vulnerability, of 802.11 and rounds it out with some misc stuff in Part III (see TOC for listing).
Well written. This book actually is not a stuggle to read. (though I have only read chapters 3-9 and skimmed chapters 1-2). I even enjoy reading it before going to sleep. This goes back to the title of my review. Good balance of general overview and detailed technical information. Or better yet, a good buildup of general overview then followed by a detailed technical description of the topic.
I would recommend for intermediate to expert networking folks (devs, testers, project mgrs, admins).
In terms of understanding architecture, and the cryptography behind the security protocols this was my favorite book. My favorite chapter was the how WEP works and why it doesn't. The writing was clear and the explanations were accurate. I also loved chapter 15, that equipped me to explain why wireless networks are dangerous beasts with detail.
It is a tougher read than some of the other books on the subject, the good news is that you understand the cryptography, the bad news is you have to work through the pages with the crytography.
This is a good book and it is well worth the price. Why did I give it 4 stars instead of 5? It could improve in a couple areas. I think it would have been a stronger, more focused work without chapters 2, 3, and 4. Any reader that is willing to wade through the inner workings of TLS, TKIP or WPA doesn't need a security overview. Also, I really wish more effort had been put into chapter 14, Public Wireless Hotspots. It is good, it covers the fundamentals, but I finished the chapter without increasing my understanding of a question every reader of the book will have. Do I dare check my (encrypted) email at a Starbucks or airport hot spot? That said, I think with second edition the authors will have every chance to take the lead in the crowded field of 802.11 books.
Most recent customer reviews
I am reading this book and it is helping me a lot with my certification towards the CWNA, the material is very good, explanations are clear and the author has a...Read more