Book description
The world of wireless and mobile devices is evolving day-to-day, with many individuals relying solely on their wireless devices in the workplace and in the home. The growing use of mobile devices demands that organizations become more educated in securing this growing technology and determining how to best protect their assets. Written by an industry expert, Wireless and Mobile Device Security explores the evolution of wired networks to wireless networking and its impact on the corporate world. Using case studies and real-world events, it goes on to discuss risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches. The text closes with a look at the policies and procedures in place and a glimpse ahead at the future of wireless and mobile device security.
Table of contents
- Cover
- Title Page
- Copyright
- Contents
- Dedication
- Preface
- Acknowledgments
-
Part One Introduction to Wireless and Mobile Networks
-
Chapter 1 The Evolution of Data Networks
- The Dawn of Data Communication
- Mobile Phones and the Creation of the Other New Network
- Computers Go Mobile
- The Convergence of Mobile and Data Networks
- The Impact of Bring Your Own Device
- The Basic Tenets of Network Security
- The Evolution of Cybercrime
- Wireless Network Security
- Mobile IP Security
- Chapter Summary
- Key Concepts and Terms
- Chapter 1 Assessment
-
Chapter 2 The Evolution of Wired Networking to Wireless Networking
- Networking and the Open System Interconnection Reference Model
- From Wired to Wireless
- The Economic Impact of Wireless Networking
- Wireless Networking and the Way People Work
- The Wi-Fi Market
- How Wi-Fi Affects Developing Nations
- The Internet of Things
- Chapter Summary
- Key Concepts and Terms
- Chapter 2 Assessment
- Chapter 3 The Mobile Revolution
- Chapter 4 Security Threats Overview: Wired, Wireless, and Mobile
-
Chapter 1 The Evolution of Data Networks
-
Part Two WLAN Security
- Chapter 5 How Do WLANs Work?
-
Chapter 6 WLAN and IP Networking Threat and Vulnerability Analysis
- Types of Attackers
- Targets of Opportunity Versus Specific Targets
- Scouting for a Targeted Attack
- Physical Security and Wireless Networks
- Social Engineering
- Wardriving
- Rogue Access Points
- Bluetooth Vulnerabilities and Threats
- Packet Analysis
- Wireless Networks and Information Theft
- Malicious Data Insertion on Wireless Networks
- Denial of Service Attacks
- Peer-to-Peer Hacking over Ad Hoc Networks
- When an Attacker Gains Unauthorized Control
- Chapter Summary
- Key Concepts and Terms
- Chapter 6 Assessment
- Chapter 7 Basic WLAN Security Measures
- Chapter 8 Advanced WLAN Security Measures
- Chapter 9 WLAN Auditing Tools
- Chapter 10 WLAN and IP Network Risk Assessment
-
Part Three Mobile Security
- Chapter 11 Mobile Communication Security Challenges
- Chapter 12 Mobile Device Security Models
- Chapter 13 Mobile Wireless Attacks and Remediation
- Chapter 14 Fingerprinting Mobile Devices
- Chapter 15 Mobile Malware and Application-Based Threats
- Appendix A Answer Key
- Appendix B Standard Acronyms
- Glossary of Key Terms
- References
- Index
Product information
- Title: Wireless and Mobile Device Security
- Author(s):
- Release date: December 2014
- Publisher(s): Jones & Bartlett Learning
- ISBN: 9781284059281
You might also like
book
Wireless and Mobile Device Security, 2nd Edition
Written by an industry expert, Wireless and Mobile Device Security explores the evolution of wired networks …
book
Take Control of Wi-Fi Networking and Security, 2nd Edition
Get more from your Wi-Fi network Version 2.0, updated January 16, 2024 Setting up and securing …
book
Cyber Security and Network Security
CYBER SECUTIRY AND NETWORK SECURITY Written and edited by a team of experts in the field, …
book
Practical Internet of Things Security - Second Edition
A practical, indispensable security guide that will navigate you through the complex realm of securely building …