Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Security: Know It All

Buy
Wireless Security: Know It All, 9781856175296 (1856175294), Newnes, 2008
The latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!

A 360-degree view from our best-selling authors

Hot topics covered

The ultimate hard-working desk reference; all the essential information, techniques and tricks of the trade in one volume

About the Author

Alan Bensky, MScEE, an electronics engineering consultant with over 25 years of experience in analog and digital design, management, and marketing. Specializing in wireless circuits and systems, Bensky has carried out projects for varied military and consumer applications. He is the author of Short-range Wireless Communication, Second Edition, published by Elsevier, 2004, and has written several articles in international and local publications. He has taught courses and gives lectures on radio engineering topics. Bensky is a senior member of IEEE.

Tony Bradley (CISSP-ISSAP) is the Guide for the Internet/Network Security site on About.com, a part of The New York Times Company. He has written for a variety of other Web sites and publications, including BizTech Magazine, PC World, SearchSecurity.com, WindowsNetworking.com, Smart Computing magazine, and Information Security magazine.
Tony is a CISSP (Certified Information Systems Security Professional) and ISSAP (Information Systems Security Architecture Professional). He is Microsoft Certified as an MCSE (Microsoft Certified Systems Engineer) and MCSA (Microsoft Certified Systems Administrator) in Windows 2000 and an MCP (Microsoft Certified Professional) in Windows NT. Tony is recognized by Microsoft as an MVP (Most Valuable Professional) in Windows security.
On his About.com site, Tony has on average over 600,000 page views per month and over 30,000 subscribers to his weekly newsletter. Tony was also author of Essential Computer Security: Everyones Guide to E-mail, Internet, and Wireless Security (ISBN: 1597491144).

Chris Hurley is a Senior Penetration Tester in the Washington, DC area. He has more than 10 years of experience performing penetration testing, vulnerability assessments, and general INFOSEC grunt work. He is the founder of the WorldWide WarDrive, a four-year project to assess the security posture of wireless networks deployed throughout the world. Chris was also the original organizer of the DEF CON WarDriving contest. He is the lead author of WarDriving: Drive, Detect, Defend (Syngress Publishing, ISBN: 19318360305). He has contributed to several other Syngress publications, including Penetration Tester's Open Source Toolkit (ISBN: 1-5974490210), Stealing the Network: How to Own an Identity (ISBN: 1597490067), InfoSec Career Hacking (ISBN: 1597490113), and OS X for Hackers at Heart (ISBN: 1597490407). He has a BS from Angelo State University in Computer Science and a whole bunch of certifications to make himself feel important.

Dr. Steve Rackley has over 30 years of experience of various aspects of the IT industry, starting in the era of punched cards and IBM mainframes in the 1970s. He soldered together and machine code programmed his first microcomputer while researching laser physics at The Cavendish Laboratory in Cambridge, and has been programming computers ever since. Most recently he has been eBusiness Manager for a UK based multi-national, managing projects to implement new Information Technologies, including the Internet, Web-services, Enterprise Portals, and Wireless Networks.

John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliabiltiy and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup.

James F. Ransome, Ph.D., CISSP, CISM, has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph.D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disci

(HTML tags aren't allowed.)

Nonlinear System Identification: NARMAX Methods in the Time, Frequency, and Spatio-Temporal Domains
Nonlinear System Identification: NARMAX Methods in the Time, Frequency, and Spatio-Temporal Domains

Nonlinear System Identification: NARMAX Methods in the Time, Frequency, and Spatio-Temporal Domains describes a comprehensive framework for the identification and analysis of nonlinear dynamic systems in the time, frequency, and spatio-temporal domains. This book is written with an emphasis on making the algorithms accessible so that...

The Accessibility Handbook
The Accessibility Handbook
Many people ask me how a developer who was working on the back-end for websites got involved in accessibility. After all, it wasn’t technically a part of my job description. It wasn’t going to make our sites faster (though I later found out it could have that side affect). I didn’t have a...
Search Engine Optimization: An Hour a Day
Search Engine Optimization: An Hour a Day
Drive Targeted Traffic to Your Website

A Step-by-Step Guide

As bracing as a shot of espresso, Search Engine Optimization: An Hour a Day offers brisk advice, bite-sized tasks, and straightforward tools to help you significantly increase visibility for your website on all the major...


Access Data Analysis Cookbook
Access Data Analysis Cookbook
If you have large quantities of data in a Microsoft Access database, and need to study that data in depth, this book is a data cruncher's dream. Access Data Analysis Cookbook offers practical recipes to solve a variety of common problems that users have with extracting Access data and performing calculations on it. Each recipe includes a...
LINQ for Visual C# 2008 (Firstpress)
LINQ for Visual C# 2008 (Firstpress)
Every C# programmer needs to learn about LINQ (Language–lIntegrated Query), Microsoft’s breakthrough technology for simplifying and unifying data access from any data source. With LINQ you can write more elegant and flexible code not just to access databases and files but to manipulate data structures and XML.

This book is a short...

Resveratrol in Health and Disease (Oxidative Stress and Disease)
Resveratrol in Health and Disease (Oxidative Stress and Disease)

Practicing evidenced-based medicine some 25 centuries ago, Hippocrates proclaimed "Let food be thy medicine and medicine be thy food." This advice parallels the common American saying, "You are what you eat," and is supported by a National Institute of Health recommendation to consume as many as eight servings of fruits...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy