<< 1 >>
Rating: Summary: Detailed and Concise Review: I have to admit I was very naive about wireless security, hence the need to educate myself. The problem is there is so much noise out there, misleading, conflicting or confusing information regarding the topic. This was the first book I was able to really walk away from feeling very comfortable that I covered the most important angles.Right off the bat I was happy to find that it's very "vendor agnostic", not focusing on tools or techniques that are unique to certain commercial systems. The pace of the book is good, first walking you through the basics of wireless network security, then moving into the components of network security then how they relate to wireless networks. It's also nice that they have an entire chapter dedicated to integrating wireless access into an existing network - something most of us are needing to do these days. Lastly, it covers a variety of differing security models. These become very helpful because you can use them as a basis for cumstomizing your own wireless security system. Overall, if you're a network security professional looking for a good solid foundation in how it pertains to wireless networks, this a great book to have around.
Rating: Summary: Detailed and Concise Review: I have to admit I was very naive about wireless security, hence the need to educate myself. The problem is there is so much noise out there, misleading, conflicting or confusing information regarding the topic. This was the first book I was able to really walk away from feeling very comfortable that I covered the most important angles. Right off the bat I was happy to find that it's very "vendor agnostic", not focusing on tools or techniques that are unique to certain commercial systems. The pace of the book is good, first walking you through the basics of wireless network security, then moving into the components of network security then how they relate to wireless networks. It's also nice that they have an entire chapter dedicated to integrating wireless access into an existing network - something most of us are needing to do these days. Lastly, it covers a variety of differing security models. These become very helpful because you can use them as a basis for cumstomizing your own wireless security system. Overall, if you're a network security professional looking for a good solid foundation in how it pertains to wireless networks, this a great book to have around.
<< 1 >>
|