January 2008
Intermediate to advanced
336 pages
9h 43m
English
It seems as if a pattern is emerging, doesn't it? Engineers from interested hardware and software companies gather under the flag of an IEEE task force to develop yet another new set of network security tools to make their products safe from hackers, crackers, eavesdroppers, and other miscreants—and a few months later, an independent researcher at some university or government agency discovers that the new tools have their own serious problems that expose the "protected" data to break-ins and leaks, and yet another cracking program shows up on the Internet, "just to demonstrate the concept." In the meantime, the poor end users of the world are running as fast as they can to keep up, but their wireless networks ...