LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: September 15th, 2014
Linux Security Week: September 8th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Review: The Book of Wireless Print E-mail
User Rating:      How can I rate this item?
Posted by Bill Keys   
Book Reviews “The Book of Wireless” by John Ross is an answer to the problem of learning about wireless networking. With the wide spread use of Wireless networks today anyone with a computer should at least know the basics of wireless. Also, with the wireless networking, users need to know how to protect themselves from wireless networking attacks.


Date: April 14th, 2008

Vitals:

Title: The Book of Wireless
Author: John Ross
Pages: 326
ISBN: ISBN-John Ross
Publisher: No Starch Press
Edition: 2nd Edition
Purchase: No Starch Press: Firewalls



Bill Keys


Overview:

“The Book of Wireless” by John Ross is an answer to the problem of learning about wireless networking. With the wide spread use of Wireless networks today anyone with a computer should at least know the basics of wireless. Also, with the wireless networking, users need to know how to protect themselves from wireless networking attacks.

Ross's book provides a general but detailed look at all parts of wireless on all different platforms and environment. The reader will gain an understanding of all parts of wireless networking, from physical layer to the application layer of networking with examples of setting up their own wireless network. The author explains why users need to take measures in securing their wireless networks. This book is intended for reader's who want to learn more about wireless networking. Those who are thinking about using wireless to the user who has already setup a home wireless network will find this book useful.

Review Summary:

The first three chapters in the “The Book of Wireless” provides the reader with an introduction to networking and wireless. The author talks about the OSI Model, physical, data link, network, transport, session, presentation, and application layers. These chapters would be a good introduction to any computer networking class. It gives the reader the background information of how wireless networking works.

Chapters four and five look at the hardware used in networking and how-to setup a home or office WI-FI network. If you need to quickly setup a wireless network theses are the chapters for you. The author does a good job at explaining the different configuration options which the user has to choose from. This allows the user to choose which networking setup will work best for that particular user. Chapters six through eight focuses on ways of connecting to an access point with Windows, Mac, Linux or Unix. The author teaches the user how to use the different wireless tools out there no matter which operating system you use. I am happy to see a chapter on Linux where the author explains everything to the Linux user everything, which they need to connect to any wireless network. The author even explains the wireless device drive Linux users will need.

Chapter 9 brings to light all the details of setting up a wireless network. The reader will learn how to setup an access point and have a greater understanding of the different technologies used here. The author even goes into detail on how the user can setup a neighborhood network. An important step in setting up any wireless is security and the author states some of the different methods of increasing your wireless security when setting up a wireless access point.

Chapter 12 which I believe is the most important chapter in wireless networking is wireless network security. The author explains the differences between the different methods of increasing a wireless network. I liked how the author explains why users should use one method over another. This chapter is for any user that is wondering what are the differences between WEP and WPA and which one they should use. The author even goes into detail about how to use the firewall on your router to increase your network security and health. This chapter is a must read for anyone who has a wireless network.

Chapter 17 is for the user that is in charge of setting up their wireless network and has found a problem with it. The author goes into detail some of the common problems the user may come across.

In conclusion, if you or anyone you know has a wireless network or is planning on setting up one, “The Book of Wireless” is a valuable resource to read. You will gain a better understanding of wireless networking. No matter which operating system you are using, you will be able to connect and setup a secure wireless network in no time.

Comments
thanksWritten by mk_linux on 2008-04-15 03:20:26
thank you
Written by bigred on 2008-11-09 21:06:56
how can i get my boyfriend password to his phon he have a t-moil and his emai li think his is chcating onme can u hlep me

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
Apache Warns of Tomcat Remote Code Execution Vulnerability
Cloud security: We're asking the wrong questions
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.