Wireless And Mobile Device Security by Jim DohertyWireless And Mobile Device Security by Jim Doherty

Wireless And Mobile Device Security

byJim Doherty

Paperback | January 6, 2015

Pricing and Purchase Info


Earn 605 plum® points

Prices and offers may vary in store


Ships within 1-2 weeks

Ships free on orders over $25

Not available in stores


The world of wireless and mobile devices is evolving day-to-day, with many individuals relying solely on their wireless devices in the workplace and in the home. The growing use of mobile devices demands that organizations become more educated in securing this growing technology and determining how to best protect their assets. Written by an industry expert, Wireless and Mobile Device Security explores the evolution of wired networks to wireless networking and its impact on the corporate world. Using case studies and real-world events, it goes on to discuss risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches. The text closes with a look at the policies and procedures in place and a glimpse ahead at the future of wireless and mobile device security.
Jim Doherty is the Sr. Vice President of Marketing Officer at Ixia. Jim has lead held marketing, sales and engineering leadership positions at Certes Networks, Motorola, Cisco Systems and Ericsson during a 19-year career in the networking and communications sectors. Jim has made a name for himself in the industry due to his ability to...
Title:Wireless And Mobile Device SecurityFormat:PaperbackDimensions:394 pages, 9.13 × 7.38 × 0.88 inPublished:January 6, 2015Publisher:Jones & Bartlett LearningLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:1284059278

ISBN - 13:9781284059274

Look for similar items by category:


Table of Contents

Chapter 1: Evolution of Wired Networking to Wireless Networking Chapter 2: Wireless LAN Design & Components Chapter 3: How Do Wireless LAN Systems Work? Chapter 4: Hardware and Software Components Chapter 5: Implementation, Management and Countermeasures Chapter 6: Risk Assessment Chapter 7: Threat and Vulnerability Analysis Chapter 8: Basic Security Measures Chapter 9: Advanced Security Measures Chapter 10: Wireless LAN Auditing Tools Chapter 11: Mobile Communication Security Challenges Chapter 12: Mobile Device Security Models Chapter 13: Fingerprinting Mobile Devices Chapter 14: Policy Considerations and Development Chapter 15: Mobile Wireless Attacks