Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Security: Know It All

Buy
Wireless Security: Know It All, 9781856175296 (1856175294), Newnes, 2008
The latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!

A 360-degree view from our best-selling authors

Hot topics covered

The ultimate hard-working desk reference; all the essential information, techniques and tricks of the trade in one volume

About the Author

Alan Bensky, MScEE, an electronics engineering consultant with over 25 years of experience in analog and digital design, management, and marketing. Specializing in wireless circuits and systems, Bensky has carried out projects for varied military and consumer applications. He is the author of Short-range Wireless Communication, Second Edition, published by Elsevier, 2004, and has written several articles in international and local publications. He has taught courses and gives lectures on radio engineering topics. Bensky is a senior member of IEEE.

Tony Bradley (CISSP-ISSAP) is the Guide for the Internet/Network Security site on About.com, a part of The New York Times Company. He has written for a variety of other Web sites and publications, including BizTech Magazine, PC World, SearchSecurity.com, WindowsNetworking.com, Smart Computing magazine, and Information Security magazine.
Tony is a CISSP (Certified Information Systems Security Professional) and ISSAP (Information Systems Security Architecture Professional). He is Microsoft Certified as an MCSE (Microsoft Certified Systems Engineer) and MCSA (Microsoft Certified Systems Administrator) in Windows 2000 and an MCP (Microsoft Certified Professional) in Windows NT. Tony is recognized by Microsoft as an MVP (Most Valuable Professional) in Windows security.
On his About.com site, Tony has on average over 600,000 page views per month and over 30,000 subscribers to his weekly newsletter. Tony was also author of Essential Computer Security: Everyones Guide to E-mail, Internet, and Wireless Security (ISBN: 1597491144).

Chris Hurley is a Senior Penetration Tester in the Washington, DC area. He has more than 10 years of experience performing penetration testing, vulnerability assessments, and general INFOSEC grunt work. He is the founder of the WorldWide WarDrive, a four-year project to assess the security posture of wireless networks deployed throughout the world. Chris was also the original organizer of the DEF CON WarDriving contest. He is the lead author of WarDriving: Drive, Detect, Defend (Syngress Publishing, ISBN: 19318360305). He has contributed to several other Syngress publications, including Penetration Tester's Open Source Toolkit (ISBN: 1-5974490210), Stealing the Network: How to Own an Identity (ISBN: 1597490067), InfoSec Career Hacking (ISBN: 1597490113), and OS X for Hackers at Heart (ISBN: 1597490407). He has a BS from Angelo State University in Computer Science and a whole bunch of certifications to make himself feel important.

Dr. Steve Rackley has over 30 years of experience of various aspects of the IT industry, starting in the era of punched cards and IBM mainframes in the 1970s. He soldered together and machine code programmed his first microcomputer while researching laser physics at The Cavendish Laboratory in Cambridge, and has been programming computers ever since. Most recently he has been eBusiness Manager for a UK based multi-national, managing projects to implement new Information Technologies, including the Internet, Web-services, Enterprise Portals, and Wireless Networks.

John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliabiltiy and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup.

James F. Ransome, Ph.D., CISSP, CISM, has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph.D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disci

(HTML tags aren't allowed.)

Programming Microsoft Outlook and Microsoft Exchange (with CD-ROM)
Programming Microsoft Outlook and Microsoft Exchange (with CD-ROM)
Developers learn how to build and run core business services across the enterprise using Microsoft's powerful messaging and collaboration tools?Outlook 2000 and Exchange Server 5.5. Now in its second edition, this bestselling book has been updated and revised to dig even deeper into Outlook 2000 capabilities such as the Digital Dashboard, the...
Evidence-Based Endocrinology
Evidence-Based Endocrinology

This pocket-sized quick-reference handbook presents evidence-based recommendations for diagnosis and treatment of endocrine disorders. The authors summarize the latest and best clinical studies supporting the practice recommendations and grade each study to indicate the benefits and risks of the therapy and the reliability of the...

Professional DevExpress ASP.NET Controls (Wrox Programmer to Programmer)
Professional DevExpress ASP.NET Controls (Wrox Programmer to Programmer)

Learn to use Devexpress ASP.NET controls, and get $250 worth of controls included with the book

Devexpress is a leading supplier of ASP.NET controls - the addins used in ASP.NET sites. Not only does this book show you how to make the most of them with Silverlight and Ajax, reporting, calendars, editors, and charts, but you also...


Building Websites with TYPO3
Building Websites with TYPO3
Follow a clear path through the power and complexity of TYPO3 to get started, and build your own TYPO3 website This book is a fast paced tutorial to creating a website using TYPO3. If you have never used TYPO3, or even any web content management system before, then you need not look further than this book as it walks you through each step to...
Disciplined Agile Delivery: A Practitioner's Guide to Agile Software Delivery in the Enterprise (IBM Press)
Disciplined Agile Delivery: A Practitioner's Guide to Agile Software Delivery in the Enterprise (IBM Press)

Master IBM’s Breakthrough DAD Process Framework for Succeeding with Agile in Large, Complex, Mission-Critical IT Projects

 

It is widely recognized that moving from traditional to agile approaches to build software solutions is a critical...

Beginning Fedora Desktop: Fedora 18 Edition
Beginning Fedora Desktop: Fedora 18 Edition

Beginning Fedora Desktop: Fedora 18 Edition is a complete guide to using the Fedora 18 Desktop Linux release as your daily driver for mail, productivity, social networking, and more. Author and Linux expert Richard Petersen delves into the operating system as a whole and offers you a complete treatment of Fedora 18...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy