contact contact contact
Ê Articles | Editorials | Reviews | News | InfoSec Directory | Releases | Submit PR
GFI LANguard Network Security Scanner - Network-wide security vulnerability scanning & fixing - Free version available.

Network Security Software - Sponsored by GFI Network Security.

802.11 Wireless Networks: The Definitive Guide, Second Edition
Publication date: Friday, 29 April 2005

Creating and Administering Practical Networks O'Reilly Releases "802.11 Wireless Networks: The Definitive Guide, Second Edition"

Sebastopol, CA--The appeal of wireless networks comes down to two things, according to Matthew Gast: "People move. Networks don't." In a world that's become increasingly mobile, traditional networks are proving inadequate to meet the challenges imposed by their users. "If users must be connected to a network by physical cables, their movement is dramatically reduced," observes Gast. "Wireless connectivity, however, poses no such restrictions and allows a great deal more free movement on the part of the network user." To illustrate, Gast points to the proliferation of mobile phone usage. "Adding mobile connectivity into the mix for telephony has had profound influence on the business of delivering voice calls, because callers could be connected to people, not devices. We're on the cusp of an equally profound change in computer networking."

Indeed, using a wireless network can be a liberating experience. But underneath the experience lies a complex protocol, and even more complex issues arise when data isn't limited to traveling on wires. In his book,
"802.11 Wireless Networks: The Definitive Guide, Second Edition"
(O'Reilly, US $44.95), Gast discusses the many issues facing those who are responsible for deploying and maintaining wireless networks: How do you structure your network so mobile users can move around effectively? How do you extend wireless coverage so it's available everywhere you need it?
What kind of security issues do wireless networks raise? Gast answers these questions and many more.

The new edition of "802.11 Wireless Networks: The Definitive Guide" brings readers up-to-date on all the latest developments in wireless networking.
"802.11 has easily been the most dynamic area of network technology in the past three years," says Gast. "When the first edition of this book came out, the most common physical layer was the 11 Mbps 802.11b. The standard physical layer is now 802.11a or 802.11g, both of which offer a data rate of 54 Mbps." In addition to covering these protocols, this edition looks ahead to the 802.11n protocol, which is currently being standardized. The book also greatly expands the discussion of network planning and architecture, paying special attention to mobility between access points, spectrum management, and power control.

Three years ago, security was the biggest challenge confronting wireless networks. "That's largely been fixed through new standards," Gast notes.
"The problems now are related to popularity. Wireless LANs have moved from a neat curiosity into something that is used on a regular basis. Once it has become part of the way that people work, the service needs to be much more reliable."

Written for the serious network or system administrator, "802.11 Wireless
Networks: The Definitive Guide, Second Edition" aims to be the comprehensive reference on wireless networking. The book serves the dual purpose of explaining the 802.11 standard itself, while offering practical advice on building wireless LANs with 802.11 equipment. It contains an extensive discussion of security issues, including the problems with the WEP standard and a look at the alternatives. Another chapter is devoted to network analysis and troubleshooting, using Ethereal and other tools. Gast also shows how to configure wireless cards and Linux, Windows, and Mac OS X systems.

"Using new network technology always requires a balance between theory and practice," says Gast. "The theory helps you design the network and troubleshoot the equipment when it breaks, but it is not always helpful when you have a piece of equipment that implements one vendor's view of the world. Most books will tell either how the standard works or how to use a specific piece of equipment or software. In this book, I have tried to weave together both the theory and the practical sides of the matter."

About O'Reilly
O'Reilly Media, Inc. is the premier information source for leading-edge computer technologies. The company's books, conferences, and web sites bring to light the knowledge of technology innovators. O'Reilly books, known for the animals on their covers, occupy a treasured place on the shelves of the developers building the next generation of software.
O'Reilly conferences and summits bring alpha geeks and forward-thinking business leaders together to shape the revolutionary ideas that spark new industries. From the Internet to XML, open source, .NET, Java, and web services, O'Reilly puts technologies on the map. For more information:
http://www.oreilly.com


Wednesday, May 11, 2005

Network Security

Avoid a man in the middle attack
Symantec Research Labs Creates New Worm Simulator
Symantec false alert floors Macs
Filtering software: Better, but still fallible

Wireless Security

Wi-Fi phishing scam targets business travelers
Firms call for action on wireless security
Users untouched by mobile viruses despite hype
Is VoIP Service the Next Big Target for Hackers?

InfoSec Directory

What is the point of encryption if you don’t know who for?
Smart-Phone Attacks and Defenses
Preventing Spyware Infestation
Preliminary study: Bluetooth Security

Press Releases

Vanguard Integrity Professionals Simplifies the Delivery of Security Software for the Mainframe
Trend Micro to Acquire InterMute
Laplink Announces Investment by Microsoft
WRQ Reflection For Secure IT Delivers On Priority Security Needs
ÊCopyright © 2000 - 2005 eBCVG IT Security Affiliates :: RSS feeds :: PrivacyÊ
Site Meter

Ê