Home :: Books :: Professional & Technical  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet
Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical

Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Wireless Security: Models, Threats, and Solutions

Wireless Security: Models, Threats, and Solutions

List Price: $65.00
Your Price: $53.08
Product Info Reviews

<< 1 2 >>

Rating: 5 stars
Summary: A very good book!
Review: Although on first reading the book appears to give a comprehensive introduction to wireless security. When I started to study the section on satellite security, two things became obvious. Firstly that the authors had little information on satellite security and they tried to fill out a chapter with more general information. More seriously though, the information they gave on satellite security is incorrect and, contrary to the book, encryption is widely used in commercial satellite systems. The book states that encryption is not used on any commercial satellite system. The Thuraya satellite system that covers the Middle East and Europe, for example, uses standard GSM encryption algorithms. Commercial satellites may not use encryption algorithms that have been blocked for export by the US Government, but that is quite different from not offering any encryption at all. As a result of this serious error, the validity of all the information in the book is now open to doubt.

Robert Owen

Rating: 2 stars
Summary: Incorrect Chapter on satellites
Review: Although on first reading the book appears to give a comprehensive introduction to wireless security. When I started to study the section on satellite security, two things became obvious. Firstly that the authors had little information on satellite security and they tried to fill out a chapter with more general information. More seriously though, the information they gave on satellite security is incorrect and, contrary to the book, encryption is widely used in commercial satellite systems. The book states that encryption is not used on any commercial satellite system. The Thuraya satellite system that covers the Middle East and Europe, for example, uses standard GSM encryption algorithms. Commercial satellites may not use encryption algorithms that have been blocked for export by the US Government, but that is quite different from not offering any encryption at all. As a result of this serious error, the validity of all the information in the book is now open to doubt.

Robert Owen

Rating: 1 stars
Summary: Useful for EE majors
Review: Good general overview, but does not include much on 802.11
This book is perfect for chipset developers, but less useful to network admins or infosec consultants.

Rating: 5 stars
Summary: My Review
Review: I find the book to be an excellent source regarding wireless communications. It uses straightforward language that can be easily understood by Information Security and Information Technology personnel at various levels throughout an organization.

Wireless Security: Models, Threats, and Solutions not only give the problem(s) associated with wireless communications, but also offer practical solutions on how to mitigate the risk associated with it. This book will definitely serve as a reference in my information security library.

Rating: 5 stars
Summary: A very good book!
Review: I liked this book for its wide and solid coverage of many things that could be tackled from many different angles. I have discussed its content with many colleagues and customers who read it and they all had the same positive feedback about it. Mind you this is an area that is rapidly moving forward, a couple of chapters could use a 2nd edition in the near future, especially regarding the newest standards, nevertheless this book covers a lot of material and very well!

I decided to write this note, because I was surprised and even taken aback by the irrelevance and unfairness of the comments from a previous reviewer (Aug.'03) purportedly from Australia, regarding the satellite security chapter.

The book does not make any sweeping pronouncements on commercial non-US satellite technologies like that reviewer claims, although no one denies that the reviewer's commercial example may very well turn out to be true or not true. So what? The satellite chapter of the book is clearly written from the US policy point of view (whether you like it or not, is actually irrelevant), which at the time the book was being written (a couple of years ago), presented specific and significant export hurdles. In fact the very same chapter the reviewer has a hard time with, actually discusses the use of the RPK-encryption algorithm (a New Zealand invention) in high-end satellite products of Communicado Data Ltd (a UK company). How can that same reviewer dare say that the chapter states "there is no encryption in commercial satellite systems" and that there is no mention of foreign products? Is he reading selectively what he criticizes? Or maybe he wishfuly infers it from what he projects that is written between the lines? Or maybe he does not understand what he is reading. Most probably he did spend too much time looking desperately for something bad to say about the book. This does not lend much credibility to his review. He comes across as a man with ....an ax to grind.....

Even if one takes at face value the reviewer's comment, namely that the authors allegedly did not have much knowledge on the subject, a far-fetched inference given their background, the named contributors, who have been working for the super-secret NRO, the US DOD, and the intelligence community should. I am sure that the satellite chapter would have never seen the light of the day if these people had not vetted what is being said in there. The Australian reviewer comes across as sharply biased and unfair, and most definitely with an ill-intentioned agenda against this book or its authors.

Even if the authors were at fault for such a little commercial detail, in my mind it would not constitute enough ground to even come close to raising doubts about the technical validity of the rest of the content. In fact I am amazed that Mr.Owen berates such a book that comes along with truly numerous references to go and check things out by yourself, with an impressive list of contributors, and above all with a very large number of happy and satisfied readers, as I am hearing it has become a technical best-seller, and rightfully so.

Did all these people miserably miss the point, when only Mr.Owen "down under" didn't? I seriously doubt it!!

Rating: 5 stars
Summary: An Excellent Choice for the Professional
Review: I really enjoyed reading this book. It gave a lot of sight on Wireless Security and gave a lot of useful information. Some of the chapters are long, but don't let that discourage you from purchasing the book. I found the last two chapters really challenging and difficult. Lan experience will help you get through the book. Some of the wireless solutions are easy to understand, and some of the wireless solutions are difficult. I would recommend this book to anyone who wants to learn or write a paper on wireless security.

Rating: 5 stars
Summary: An Excellent Choice for the Professional
Review: I really enjoyed reading this book. It gave a lot of sight on Wireless Security and gave a lot of useful information. Some of the chapters are long, but don't let that discourage you from purchasing the book. I found the last two chapters really challenging and difficult. Lan experience will help you get through the book. Some of the wireless solutions are easy to understand, and some of the wireless solutions are difficult. I would recommend this book to anyone who wants to learn or write a paper on wireless security.

Rating: 5 stars
Summary: Wireless Security
Review: I was recommended to read this book by my class mate and I am stunned at its depth and quality. It gave me so much detail in my studies of wireless security that I needed for my university thesis. I am pleased that there is literature out there that will put down all the facts without any "fluff." I must truly congratulate the authors for their work. I highly, highly recommend this to anybody with a thirst wireless security. I would give it more than a 5 if I could. I am also looking forward to reading Mr. Lekkas' upcoming book.

Rating: 5 stars
Summary: Extremely Useful!
Review: I'm an active systems architect from Sweden working with multiple types of wireless communications devices(cellular, Bluetooth, etc.). I have been looking for a comprehensive coverage of security aspects in RF transmissions for quite some time. A colleague of mine recommended this book to me.

My first reaction was surprise due to the breadth of its coverage. It gives a well-rounded view of the subject in a very scholarly fashion. It is very meticulously written, clearly by people who know what they are talking about, and it includes some interesting issues like voice processing and cryptography without ever becoming boring. It provides a great deal of references so one can pursue further and deeper study of the subjects that one is interested in. Lots of footnotes and explanations show the authors' attention and care about detail.

My interest happens to be in implementing embedded integrated systems and this book provided me with ample food for thought with its original coverage of issues related to cipher synchronization in real-time wireless communications protocol stacks. To my knowledge, the subject is not covered anywhere else.

Besides a couple of typos probably due to the publisher's rush to bring the book to the market, I strongly recommend this book to anyone who is interested in the area of wireless communications security.

Rating: 5 stars
Summary: Very Decent Presentation
Review: It is clear that a lot of people shared their experience with the authors. I found Wireless Security exceptionally well documented and with a flow reasonably easy to follow. The chapters on cryptanalysis and the use of ASICs were interesting. Lots of resources are presented. Its a keeper.


<< 1 2 >>

© 2004, ReviewFocus or its affiliates