Maximum Wireless Security

Front Cover
Sams Publishing, 2003 - Computers - 390 pages
0672324881.ld A detailed guide to wireless vulnerabilities, written by authors who have first-hand experience with wireless crackers and their techniques. Wireless technology and Internet security are the two fastest growing technology sectors. Includes a bonus CD packed with powerful free and demo tools to audit wireless networks. Reviewed and endorsed by the author of WEPCrack, a well-known tool for breaking 802.11 WEP encryption keys. Maximum Wireless Securityis a practical handbook that reveals the techniques and tools crackers use to break into wireless networks, and that details the steps network administrators need to take to secure their systems. The authors provide information to satisfy the experts hunger for in-depth information with actual source code, real-world case studies, and step-by-step configuration recipes. The book includes detailed, hands-on information that is currently unavailable in any printed text -- information that has been gleaned from the authors work with real wireless hackers ("war drivers"), wireless security developers, and leading security experts. Cyrus Peikariis the chief technical officer for VirusMD Corporation and has several patents pending in the anti-virus field. He has published several consumer security software programs, including an encrypted instant messenger, a personal firewall, a content filter and a suite of network connectivity tools. He is a repeat speaker at Defcon. Seth Fogie, MCSE,is a former United State Navy nuclear engineer. After retiring, he has worked as a technical support specialist for a major Internet service provider. He is currently the director of engineering at VirusMD Corporation, where he works on next-generation wireless security software. He has been invited to speak at Defcon in 2003.
 

What people are saying - Write a review

User Review - Flag as inappropriate

L/D 621.396.4 PEI

Contents

III
5
IV
6
V
7
VI
9
VII
13
VIII
14
IX
15
X
16
CLX
168
CLXI
169
CLXII
172
CLXIII
178
CLXIV
179
CLXVII
180
CLXVIII
186
CLXXII
189

XII
18
XIII
19
XIV
20
XV
21
XVIII
22
XIX
23
XX
24
XXI
25
XXII
26
XXIII
27
XXIV
28
XXVI
29
XXVIII
30
XXX
31
XXXII
32
XXXVI
33
XXXVII
34
XXXIX
35
XL
36
XLI
39
XLII
41
XLIII
42
XLVI
43
XLVII
45
XLIX
48
L
49
LI
53
LIII
55
LV
56
LVI
57
LVII
59
LVIII
60
LX
61
LXII
62
LXIII
63
LXIV
64
LXV
65
LXVI
66
LXVII
68
LXIX
69
LXXI
70
LXXII
71
LXXIII
72
LXXIV
74
LXXV
75
LXXVI
76
LXXVII
77
LXXVIII
78
LXXIX
79
LXXX
82
LXXXI
83
LXXXIII
85
LXXXV
86
LXXXVII
87
XC
88
XCI
89
XCIII
90
XCV
92
XCVI
93
XCVIII
94
C
95
CI
96
CII
97
CIV
99
CVI
101
CVIII
102
CXI
103
CXIII
105
CXV
106
CXVI
107
CXVII
108
CXVIII
109
CXXI
111
CXXII
113
CXXIII
114
CXXIV
115
CXXVI
117
CXXVII
118
CXXVIII
120
CXXIX
122
CXXX
123
CXXXI
125
CXXXII
129
CXXXIII
136
CXXXIV
142
CXXXV
144
CXXXVI
147
CXXXVII
148
CXXXVIII
151
CXL
152
CXLI
153
CXLII
154
CXLIII
155
CXLIV
156
CXLV
157
CXLVI
158
CXLVII
160
CXLIX
161
CL
162
CLII
163
CLIV
165
CLVI
167
CLXXIV
196
CLXXVIII
197
CLXXIX
199
CLXXX
202
CLXXXI
203
CLXXXIII
204
CLXXXV
205
CLXXXVI
206
CLXXXVII
207
CLXXXVIII
208
CLXXXIX
209
CXCI
210
CXCIV
214
CXCVII
215
CXCVIII
216
CC
220
CCI
222
CCII
223
CCIII
225
CCV
226
CCVI
227
CCVIII
228
CCX
229
CCXI
230
CCXIII
234
CCXV
240
CCXVII
241
CCXVIII
242
CCXIX
243
CCXX
246
CCXXI
247
CCXXII
248
CCXXIII
249
CCXXIV
250
CCXXV
255
CCXXVII
256
CCXXVIII
257
CCXXIX
259
CCXXX
261
CCXXXII
262
CCXXXV
265
CCXXXVI
268
CCXXXVII
270
CCXL
272
CCXLI
273
CCXLIV
274
CCXLV
275
CCXLVII
276
CCXLVIII
278
CCL
279
CCLI
280
CCLII
281
CCLIII
282
CCLIV
283
CCLV
284
CCLVI
285
CCLVIII
286
CCLXII
287
CCLXVI
288
CCLXVII
290
CCLXVIII
291
CCLXIX
292
CCLXX
293
CCLXXII
294
CCLXXV
295
CCLXXVI
298
CCLXXVIII
299
CCLXXIX
300
CCLXXXIII
301
CCLXXXV
302
CCLXXXVI
303
CCLXXXIX
305
CCXCII
306
CCXCV
307
CCXCVII
308
CCXCVIII
309
CCC
310
CCCII
311
CCCIV
313
CCCVI
314
CCCIX
316
CCCX
317
CCCXIV
318
CCCXV
319
CCCXVII
320
CCCXX
322
CCCXXIII
323
CCCXXV
324
CCCXXVI
325
CCCXXVII
326
CCCXXVIII
327
CCCXXIX
328
CCCXXX
331
CCCXXXII
333
CCCXXXIII
337
CCCXXXIV
359
CCCXXXVI
360
CCCXXXVII
364
CCCXXXVIII
365
CCCXXXIX
367
Copyright

Other editions - View all

Common terms and phrases

About the author (2003)

Dr. Cyrus Peikari finished his formal training with honors in electrical engineering at Southern Methodist University in 1991. For eight years Dr. Peikari taught advanced mathematics at the SMU Learning Enhancement Center in Dallas, Texas. He has also worked as a telecommunications software research and development engineer for Alcatel. Dr. Peikari has developed several award-winning security software programs. He also co-founded DallasCon, the largest annual wireless security conference in the Southwest. You can reach him at cyrus@virusmd.com.

Seth Fogie is a former United States Navy nuclear engineer. After retiring from the Navy, Mr. Fogie worked as a technical support specialist for a major Internet service provider, during which time he earned his MCSE. Currently, Mr. Fogie is director of engineering at VirusMD Wireless Security, where he develops next-generation mobile security software.

Brett L. Neilson is a network and system engineer with a strong background in the wireless industry. Mr. Neilson has previously worked for Verizon Wireless as a Senior Systems Administrator and RF Field Technician. While at Verizon he worked to develop, deploy, and maintain its national infrastructure. Currently Mr. Neilson works for a leading infosec corporation. As an FCC licensed amateur radio operator, he has worked with various government agencies providing communication assistance and coordination. His broad range of computer and RF skills has led him to perform groundbreaking research in practical wireless security. Mr. Neilson also teaches a series of review courses for the Wireless Security Expert Certification (WSEC).

Sten Lannerstrom is product portfolio manager at SmartTrust, a provider of infrastructure software for securing and managing mobile services and devices. Mr. Lannerstrom joined SmartTrust in 1997 (at that time iD2 Technologies) and has more than 22 years of experience in the area of information technology. Mr. Lannerstrom oversees SmartTrust's wireless security portfolio, including the use of smart cards, wireless devices, digital certificates, and biometrics. He holds the CISA (Certified Information Systems Auditor) accreditation.

Bibliographic information