- Page 2 and 3:
Newnes is an imprint of Elsevier 30
- Page 4 and 5:
vi Contents 4.8 Diversity Technique
- Page 6 and 7:
viii Contents Chapter 13: Managing
- Page 8 and 9:
x Contents 20.8 Summary ...........
- Page 10 and 11:
About the Authors Steven Arms (Chap
- Page 12 and 13:
About the Authors xv Timothy Stapko
- Page 14 and 15:
Part 1 Wireless Technology
- Page 16:
4 Chapter 1 Probably the most promi
- Page 21:
Wireless Fundamentals 9 standards a
- Page 24 and 25:
12 Chapter 1 classroom, provided th
- Page 26 and 27:
14 Chapter 1 for multimedia applica
- Page 28 and 29:
16 Chapter 1 is installed on their
- Page 30 and 31:
18 Chapter 1 ● Switching off the
- Page 32 and 33:
20 Chapter 1 Power Consumption The
- Page 34:
22 Chapter 2 Table 2.1 : The seven
- Page 37 and 38:
Wireless Network Logical Architectu
- Page 39 and 40:
Wireless Network Logical Architectu
- Page 41 and 42:
Wireless Network Logical Architectu
- Page 44 and 45:
32 Chapter 2 Layer 2 Data link laye
- Page 47 and 48:
Wireless Network Logical Architectu
- Page 49:
Wireless Network Logical Architectu
- Page 52 and 53:
40 Chapter 2 guidelines for impleme
- Page 56 and 57:
44 Chapter 2 while asynchronous tra
- Page 58:
46 Chapter 2 networks running other
- Page 68 and 69:
56 Chapter 3 3.3.2 Access Points Th
- Page 71 and 72:
Wireless Network Physical Architect
- Page 75 and 76:
Wireless Network Physical Architect
- Page 81 and 82:
Wireless Network Physical Architect
- Page 83 and 84:
Wireless Network Physical Architect
- Page 85:
Table 3.9 : Wireless MAN devices an
- Page 88 and 89:
CHAPTER 4 Radio Communication Basic
- Page 90 and 91:
Radio Communication Basics 79 In th
- Page 92:
Radio Communication Basics 81 Also
- Page 95 and 96:
84 Chapter 4 sight, diffraction gai
- Page 97 and 98:
86 Chapter 4 40 Path gain vs. Dista
- Page 99 and 100:
88 Chapter 4 environment, we distin
- Page 101 and 102:
90 Chapter 4 100 10 Percent error 1
- Page 103 and 104:
92 Chapter 4 It isn’t necessary t
- Page 105 and 106: 94 Chapter 4 Thus, a minimum of cir
- Page 107 and 108: Urban 96 Chapter 4 Noise and its so
- Page 110 and 111: Radio Communication Basics 99 1 0 1
- Page 112 and 113: Radio Communication Basics 101 Tabl
- Page 114 and 115: Radio Communication Basics 103 As l
- Page 116 and 117: Radio Communication Basics 105 ●
- Page 118 and 119: Radio Communication Basics 107 Thes
- Page 120 and 121: Radio Communication Basics 109 cons
- Page 122 and 123: Radio Communication Basics 111 Prea
- Page 124 and 125: Radio Communication Basics 113 thes
- Page 126 and 127: Radio Communication Basics 115 maxi
- Page 128 and 129: Radio Communication Basics 117 Phas
- Page 130 and 131: Radio Communication Basics 119 Sign
- Page 132 and 133: Radio Communication Basics 121 freq
- Page 134 and 135: Radio Communication Basics 123 Mixe
- Page 136 and 137: Radio Communication Basics 125 show
- Page 138 and 139: Radio Communication Basics 127 4.10
- Page 140 and 141: Radio Communication Basics 129 In c
- Page 142 and 143: Radio Communication Basics 131 Freq
- Page 144 and 145: Radio Communication Basics 133 Ther
- Page 146 and 147: Radio Communication Basics 135 4.11
- Page 148 and 149: CHAPTER 5 Infrared Communication Ba
- Page 150: Infrared Communication Basics 139 R
- Page 154 and 155: CHAPTER 6 Wireless LAN Standards St
- Page 159: 148 Chapter 6 Prior to 802.11k, sup
- Page 163 and 164: 152 Chapter 6 Table 6.3 : (Continue
- Page 165 and 166: 154 Chapter 6 Table 6.5 : US FCC sp
- Page 167 and 168: 156 Chapter 6 Modulation Table 6.7
- Page 169 and 170: 158 Chapter 6 Table 6.9 : 802.11b/g
- Page 173 and 174: 162 Chapter 6 Table 6.11 : WMM acce
- Page 175 and 176: 164 Chapter 6 channels that enables
- Page 177 and 178: 166 Chapter 6 Table 6.13 : 802.11k
- Page 179 and 180: 168 Chapter 6 Although there is sti
- Page 183 and 184: 172 Chapter 6 that dominance was fa
- Page 185 and 186: 174 Chapter 6 Rate (Mbps) Table 6.1
- Page 187 and 188: 176 Chapter 7 other using low power
- Page 189 and 190: 178 Chapter 7 Figure 7.2 : Star net
- Page 192 and 193: Wireless Sensor Networks 181 comput
- Page 195 and 196: 184 Chapter 7 consumption in a typi
- Page 197 and 198: 186 Chapter 7 Other applications in
- Page 199 and 200: 188 Chapter 7 7.7 Future Developmen
- Page 201 and 202: Part 2 Security Definitions and Con
- Page 203 and 204: 194 Chapter 8 8.1 Threats to Person
- Page 205 and 206: 196 Chapter 8 4. Utility fraud . Wh
- Page 207 and 208:
198 Chapter 8 satisfaction. Later i
- Page 209 and 210:
200 Chapter 8 aid their domestic in
- Page 211 and 212:
202 Chapter 8 with other activities
- Page 213 and 214:
204 Chapter 8 Both dissemination an
- Page 215 and 216:
206 Chapter 8 first audit of the ye
- Page 217 and 218:
CHAPTER 9 Security Defined Timothy
- Page 219 and 220:
Security Defined 211 9.2 What Can W
- Page 221 and 222:
Security Defined 213 The rights def
- Page 225 and 226:
Security Defined 217 It is also a t
- Page 227:
Security Defined 219 The newest for
- Page 232:
224 Chapter 9 be an issue for banki
- Page 236:
228 Chapter 9 9.5.4 Public-Key Infr
- Page 240 and 241:
CHAPTER 10 Standardizing Security T
- Page 242 and 243:
Standardizing Security 235 the boun
- Page 244 and 245:
Standardizing Security 237 security
- Page 246 and 247:
Standardizing Security 239 today. D
- Page 248 and 249:
Standardizing Security 241 implemen
- Page 250 and 251:
Standardizing Security 243 AES can
- Page 252 and 253:
Standardizing Security 245 When cho
- Page 254:
Standardizing Security 247 Applicat
- Page 257 and 258:
CHAPTER 11 Secure Sockets Layer Tim
- Page 259 and 260:
Secure Sockets Layer 253 to figure
- Page 263 and 264:
Secure Sockets Layer 257 11.4 SSL u
- Page 266:
260 Chapter 11 handshake. When we g
- Page 270:
264 Chapter 11 The key material blo
- Page 275 and 276:
CHAPTER 12 Cryptography Timothy Sta
- Page 277 and 278:
Cryptography 271 Given the confusio
- Page 279 and 280:
Cryptography 273 much guaranteed) t
- Page 281 and 282:
Cryptography 275 In this chapter, w
- Page 283 and 284:
Cryptography 277 12.2.1 Is Hashing
- Page 285 and 286:
Cryptography 279 for a wide variety
- Page 287 and 288:
Cryptography 281 to produce a secur
- Page 289 and 290:
Cryptography 283 that moves the key
- Page 291 and 292:
Cryptography 285 we are dealing wit
- Page 293 and 294:
Cryptography 287 12.4 Choosing Cryp
- Page 296 and 297:
290 Chapter 12 The astute reader ma
- Page 298 and 299:
292 Chapter 12 1980s, we still have
- Page 300 and 301:
294 Chapter 13 access to the data t
- Page 302 and 303:
296 Chapter 13 database query again
- Page 304 and 305:
298 Chapter 13 their membership in
- Page 306 and 307:
300 Chapter 13 As an example, Joe i
- Page 308 and 309:
302 Chapter 13 to get something don
- Page 310 and 311:
304 Chapter 13 This method is espec
- Page 312 and 313:
306 Chapter 13 13.1.8.7 Constrained
- Page 314 and 315:
308 Chapter 13 of services. They pr
- Page 316 and 317:
310 Chapter 13 Biometric systems ar
- Page 318 and 319:
312 Chapter 13 domain controllers,
- Page 320 and 321:
314 Chapter 13 to be very effective
- Page 322 and 323:
CHAPTER 14 Security and the Law Joh
- Page 324 and 325:
Security and the Law 319 Ten days a
- Page 326 and 327:
Security and the Law 321 identified
- Page 328 and 329:
Security and the Law 323 3. To brin
- Page 330 and 331:
Security and the Law 325 14.5.4 Sco
- Page 332 and 333:
Security and the Law 327 14.5.6 Eme
- Page 334 and 335:
Security and the Law 329 3. The per
- Page 336 and 337:
Security and the Law 331 14.5.10.3
- Page 338 and 339:
Security and the Law 333 “ inters
- Page 340 and 341:
Security and the Law 335 and Infras
- Page 342 and 343:
CHAPTER 15 Intrusion Process John R
- Page 344 and 345:
Intrusion Process 339 attention to
- Page 346 and 347:
Intrusion Process 341 Recently, a h
- Page 348 and 349:
Intrusion Process 343 15.4.1.3 Kism
- Page 350 and 351:
Intrusion Process 345 determined by
- Page 352 and 353:
Intrusion Process 347 chances for h
- Page 354 and 355:
Intrusion Process 349 curbside on n
- Page 356 and 357:
Intrusion Process 351 very weak for
- Page 358 and 359:
Intrusion Process 353 2. It recover
- Page 360 and 361:
Intrusion Process 355 15.8 Share En
- Page 362 and 363:
Intrusion Process 357 generally use
- Page 364 and 365:
Intrusion Process 359 the rogue AP
- Page 366 and 367:
Intrusion Process 361 3. The URL fo
- Page 368 and 369:
364 Chapter 16 E High Likelihood Fo
- Page 370 and 371:
366 Chapter 16 Assurance - The crit
- Page 372:
CHAPTER 17 Security in Traditional
- Page 375:
372 Chapter 17 air interface. GSM p
- Page 378 and 379:
Security in Traditional Wireless Ne
- Page 380 and 381:
Security in Traditional Wireless Ne
- Page 382 and 383:
Security in Traditional Wireless Ne
- Page 384:
Security in Traditional Wireless Ne
- Page 388 and 389:
Security in Traditional Wireless Ne
- Page 390 and 391:
Security in Traditional Wireless Ne
- Page 392 and 393:
Security in Traditional Wireless Ne
- Page 394 and 395:
Security in Traditional Wireless Ne
- Page 396 and 397:
Security in Traditional Wireless Ne
- Page 398 and 399:
Security in Traditional Wireless Ne
- Page 400 and 401:
Security in Traditional Wireless Ne
- Page 404 and 405:
Security in Traditional Wireless Ne
- Page 406 and 407:
404 Chapter 18 In this chapter, we
- Page 408:
406 Chapter 18 18.3 Anonymity in 80
- Page 411 and 412:
Wireless LAN Security 409 authentic
- Page 414 and 415:
412 Chapter 18 channel scanning/pro
- Page 416 and 417:
414 Chapter 18 Standard WEP encrypt
- Page 418 and 419:
416 Chapter 18 Using a separate key
- Page 420 and 421:
418 Chapter 18 is fixed in length a
- Page 422 and 423:
420 Chapter 18 because the flipping
- Page 424 and 425:
422 Chapter 18 7. The ICV does not
- Page 426 and 427:
424 Chapter 18 enterprise network.
- Page 428 and 429:
426 Chapter 18 using preshared keys
- Page 430:
428 Chapter 18 order 16 bits of the
- Page 435 and 436:
Wireless LAN Security 433 concatena
- Page 438 and 439:
436 Chapter 18 WEP Relies on presha
- Page 440 and 441:
438 Chapter 18 To provide confident
- Page 443:
Wireless LAN Security 441 104-bit n
- Page 446 and 447:
444 Chapter 18 WEP WPA WPA2 Static
- Page 449 and 450:
Security in Wireless Ad Hoc Network
- Page 451:
Security in Wireless Ad Hoc Network
- Page 455 and 456:
Security in Wireless Ad Hoc Network
- Page 457 and 458:
Security in Wireless Ad Hoc Network
- Page 459 and 460:
Security in Wireless Ad Hoc Network
- Page 461 and 462:
Security in Wireless Ad Hoc Network
- Page 463 and 464:
Security in Wireless Ad Hoc Network
- Page 465 and 466:
Security in Wireless Ad Hoc Network
- Page 467 and 468:
Security in Wireless Ad Hoc Network
- Page 469 and 470:
CHAPTER 20 Implementing Basic Wirel
- Page 471 and 472:
Implementing Basic Wireless Securit
- Page 473 and 474:
Implementing Basic Wireless Securit
- Page 475:
Implementing Basic Wireless Securit
- Page 480 and 481:
478 Chapter 20 Figure 20.15 : Disab
- Page 482 and 483:
480 Chapter 20 Figure 20.18 : The a
- Page 484 and 485:
482 Chapter 20 Figure 20.22 : The L
- Page 486 and 487:
484 Chapter 20 Figure 20.25 : Enabl
- Page 488 and 489:
486 Chapter 20 Figure 20.28 : The w
- Page 490 and 491:
488 Chapter 20 Figure 20.31 : The D
- Page 492 and 493:
490 Chapter 20 Figure 20.35 : Requi
- Page 494 and 495:
492 Chapter 20 Figure 20.39 : The M
- Page 496 and 497:
494 Chapter 20 Figure 20.43 : The W
- Page 498 and 499:
496 Chapter 20 Figure 20.45 : The c
- Page 500 and 501:
498 Chapter 20 Figure 20.49 : Enter
- Page 502 and 503:
500 Chapter 20 Figure 20.51 : Set t
- Page 504 and 505:
502 Chapter 20 ● ● ● broadcas
- Page 506 and 507:
504 Chapter 21 Figure 21.1 : The DI
- Page 508 and 509:
506 Chapter 21 Damage & Defense Kno
- Page 510 and 511:
508 Chapter 21 Figure 21.7 : The wi
- Page 512 and 513:
510 Chapter 21 Figure 21.11 : WPA C
- Page 514 and 515:
512 Chapter 21 SSL provides the thr
- Page 516 and 517:
514 Chapter 21 21.3.1 Installing Do
- Page 518 and 519:
516 Chapter 21 Figure 21.15 : Makin
- Page 520 and 521:
518 Chapter 21 Figure 21.18 : Loggi
- Page 522 and 523:
520 Chapter 21 Figure 21.21 : Chang
- Page 524 and 525:
522 Chapter 21 Figure 21.24 : Creat
- Page 526 and 527:
524 Chapter 21 4. Place the dolphin
- Page 528 and 529:
526 Chapter 21 can provide. The W-R
- Page 530 and 531:
528 Chapter 21 Figure 21.30 : Deact
- Page 532 and 533:
530 Chapter 21 Figure 21.34 : The I
- Page 534 and 535:
532 Chapter 21 Figure 21.37 : The r
- Page 536 and 537:
534 Chapter 21 Figure 21.41 : Selec
- Page 538 and 539:
536 Chapter 21 Figure 21.44 : The c
- Page 540 and 541:
538 Chapter 21 21.5.1 LEAP Features
- Page 542 and 543:
540 Chapter 21 Tools and Traps Noth
- Page 544 and 545:
542 Chapter 21 Figure 21.47 : Choos
- Page 546 and 547:
544 Chapter 21 Figure 21.50 : Confi
- Page 548 and 549:
546 Chapter 21 password, click the
- Page 550 and 551:
548 Chapter 21 Figure 21.57 : Confi
- Page 552 and 553:
550 Chapter 21 Figure 21.61 : Confi
- Page 554 and 555:
552 Chapter 21 Figure 21.64 : Loggi
- Page 556 and 557:
554 Chapter 21 Figure 21.68 : Addin
- Page 558 and 559:
556 Chapter 21 ● 802.1X. Provides
- Page 560 and 561:
558 Chapter 21 ● with a challenge
- Page 562 and 563:
560 Chapter 21 21.6.2.4 Advantages
- Page 564 and 565:
562 Chapter 21 the Certificates sna
- Page 566 and 567:
564 Chapter 21 Figure 21.71 : Certi
- Page 568 and 569:
566 Chapter 21 Figure 21.73 : Choos
- Page 570 and 571:
568 Chapter 21 Figure 21.74 : Reque
- Page 572 and 573:
570 Chapter 21 There are a number o
- Page 574 and 575:
572 Chapter 21 Figure 21.77 : Addin
- Page 576 and 577:
574 Chapter 21 Figure 21.79 : Addin
- Page 578 and 579:
576 Chapter 21 environment. A prima
- Page 580 and 581:
578 Chapter 21 Figure 21.83 : Confi
- Page 582 and 583:
580 Chapter 21 authenticated by an
- Page 584 and 585:
582 Chapter 21 21.8.5 Understanding
- Page 586 and 587:
CHAPTER 22 Home Network Security To
- Page 588 and 589:
Home Network Security 587 Wireless
- Page 590 and 591:
Home Network Security 589 802.16e,
- Page 592 and 593:
Home Network Security 591 new wirel
- Page 594 and 595:
Home Network Security 593 Figure 22
- Page 596 and 597:
Home Network Security 595 22.3.7 Us
- Page 598 and 599:
Home Network Security 597 22.4.1 Ve
- Page 600 and 601:
Home Network Security 599 22.4.6 Us
- Page 602 and 603:
CHAPTER 23 Wireless Embedded System
- Page 605 and 606:
604 Chapter 23 One of the largest b
- Page 607 and 608:
606 Chapter 23 enterprise networks,
- Page 609 and 610:
608 Chapter 23 will likely need to
- Page 611:
610 Chapter 23 It should suffice fo
- Page 615 and 616:
614 Chapter 23 reasons, ZigBee will
- Page 617 and 618:
616 Chapter 24 ● ● ● ● ●
- Page 619 and 620:
618 Chapter 24 Figure 24.1 : Variou
- Page 621 and 622:
620 Chapter 24 IFF has expanded sin
- Page 623 and 624:
622 Chapter 24 Tools and Traps …
- Page 626 and 627:
RFID Security 625 where λ is the w
- Page 628:
RFID Security 627 The data carried
- Page 631 and 632:
630 Chapter 24 Figure 24.1 shows th
- Page 633 and 634:
632 Chapter 24 The ExxonMobil Speed
- Page 635 and 636:
634 Chapter 24 Figure 24.10 : E-ZPa
- Page 637 and 638:
636 Chapter 24 Spoofing Spoofi ng a
- Page 639 and 640:
638 Chapter 24 Figure 24.11 : RF du
- Page 641 and 642:
640 Chapter 24 person at risk if th
- Page 643 and 644:
642 Chapter 24 conveyor belt, they
- Page 645 and 646:
644 Chapter 24 Let’s look back at
- Page 647 and 648:
646 Chapter 24 24.9.3 Threat Manage
- Page 649 and 650:
648 Chapter 24 of the potential att
- Page 651 and 652:
650 Appendix A Two new wireless sec
- Page 653 and 654:
652 Appendix A APs is still in the
- Page 655 and 656:
654 Appendix A Author:_____________
- Page 657 and 658:
656 Appendix A 1.0 Overview Informa
- Page 659 and 660:
658 Appendix A Employees must use e
- Page 661 and 662:
660 Appendix A ● ● ● ● ●
- Page 663 and 664:
662 Appendix A this policy and asso
- Page 665 and 666:
664 Appendix A 7. In networks where
- Page 667 and 668:
666 Appendix A A.6 ABC Inc. InfoSec
- Page 669 and 670:
668 Appendix A 3. DMZs should be in
- Page 671 and 672:
670 Appendix A 7.0 Revision History
- Page 673 and 674:
672 Appendix A 6.0 Exceptions Excep
- Page 675 and 676:
674 Appendix A and is responsible f
- Page 677 and 678:
676 Appendix A A.9 ABC Inc. InfoSec
- Page 679 and 680:
678 Appendix A 7. Frame Relay must
- Page 681 and 682:
680 Appendix A 6.0 Exceptions Excep
- Page 683 and 684:
682 Appendix A 5.0 Definitions 6.0
- Page 685 and 686:
684 Appendix A 4.0 Enforcement Any
- Page 687 and 688:
686 Appendix A 5.0 Definitions User
- Page 689 and 690:
688 Appendix A ● ● ● ● ●
- Page 691 and 692:
690 Appendix A or management, and w
- Page 693 and 694:
692 Appendix A ● The password is
- Page 695 and 696:
694 Appendix A ● ● should suppo
- Page 697 and 698:
696 Appendix A 3.0 Policy 3.1 Gener
- Page 699 and 700:
698 Appendix A Hash: An algorithmic
- Page 701 and 702:
700 Appendix A 7.0 Revision History
- Page 703 and 704:
702 Appendix B Application Gateway:
- Page 705 and 706:
704 Appendix B device that is confi
- Page 707 and 708:
706 Appendix B HTML: HTML is the ba
- Page 709 and 710:
708 Appendix B IP Spoofing: IP spoo
- Page 711 and 712:
710 Appendix B Packet sniffing is u
- Page 713 and 714:
712 Appendix B SMTP: Simple Mail Tr
- Page 715 and 716:
Index A 802.11 enhancements , 159 m
- Page 717 and 718:
Index 717 fraud and theft , 194-5 i
- Page 719 and 720:
Index 719 I i.Link , see FireWire I
- Page 721 and 722:
Index 721 Path loss , 84-6 Payload
- Page 723 and 724:
Index 723 Threat and target identif
- Page 725 and 726:
Index 725 routing , 28-9 operating