PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES
Save time and money! Order your required bundles and access codes at www.shopjblearning.com!
The world of wireless and mobile devices is evolving day-to-day, with many individuals relying solely on their wireless devices in the workplace and in the home. The growing use of mobile devices demands that organizations become more educated in securing this growing technology and determining how to best protect their assets. Written by an industry expert, Wireless and Mobile Device Security explores the evolution of wired networks to wireless networking and its impact on the corporate world. Using case studies and real-world events, it goes on to discuss risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches. The text closes with a look at the policies and procedures in place and a glimpse ahead at the future of wireless and mobile device security.
Features & Benefits
- Discusses the history and evolution of wireless networks
- Explores the impact of wireless on the corporate world
- Focuses on 802.11 WLAN security in both the small office/home office world and for larger organizations
- Gives security solutions to the risks and vulnerabilities of mobile devices
- Reviews the mobile malware landscape and discusses mitigation strategies
Part 1: Introduction to Wireless and Mobile Networks
Chapter 1: The Evolution of Data Networks
Chapter 2: Evolution of Wired Networking to Wireless Networking
Chapter 3: The Mobile Revolution
Chapter 4: Security Threats Overview – Wired, Wireless and Mobile
Part 2: WLAN Security
Chapter 5: How Do Wireless LAN Systems Work?
Chapter 6: WLAN and IP Networking Threat and Vulnerability Analysis
Chapter 7: Basic WLAN Security Measures
Chapter 8: Advanced WLAN Security Measures
Chapter 9: Wireless LAN Auditing Tools
Chapter 10: WLAN and Wireless Network Risk Assessment
Part 3: Mobile Security
Chapter 11: Mobile Communication Security Challenges
Chapter 12: Mobile Device Security Models
Chapter 13: Mobile Wireless Attacks and Remediation
Chapter 14: Fingerprinting Mobile Devices
Chapter 15: Mobile Malware and Application-Based Threats
Jim Doherty is the Sr. Vice President of Marketing Officer at Ixia. Jim has lead held marketing, sales and engineering leadership positions at Certes Networks, Motorola, Cisco Systems and Ericsson during a 19-year career in the networking and communications sectors. Jim has made a name for himself in the industry due to his ability to explain networking technologies to non-technical audiences in a way that still satisfies technical professionals. He has extensive speaking and presenting experience and if often sought out to explain networking and communication technologies to non-technical audiences.
Jim is also the creator and co-author of the “Networking Simplified” series of books, and a comprehensive set of CCNA study notes; published in a number of certification guides.
Jim holds a B.S. in electrical engineering from N.C. State University,and an MBA from Duke University. Before earning his degrees Jim served in the US Marine Corps obtaining the rank of Sergeant.