Wireless Security: Models, Threats, and Solutions

Front Cover
McGraw Hill Professional, 2002 - Computers - 657 pages
1 Review
Everybody's connected. Everybody's wired. Everybody's talking. Nobody is secure. In 2001, 90 per cent of business surveyed by the FBI reported breaches of their communication systems, showing that we are only just begining to understand how porous wireless systems are. This book uncovers the threats and vunerablilities unique to wireless communication and other solutions for telecom, broadband, satellite, and other emerging markets. It also helps you plan application-aware cryptographic tactics, plot your realistic defenses, and review the commercial solutions currently on the market.

From inside the book

What people are saying - Write a review

We haven't found any reviews in the usual places.



348 other sections not shown

Common terms and phrases

References to this book

All Book Search results »

About the author (2002)

RANDALL NICHOLS is Vice President of Cryptography for TeleHubLink Corporation, where he directs development of embedded security solutions. He is Professor of Information Security at George Washington University and the author of four books on communications security, including McGraw-Hill's ICSA Guide to Cryptography.

PANOS LEKKAS is Chief Technology Officer and General Manager of Technology for TeleHubLink. Originally a VLSI designer, Mr. Lekkas worked for many years for IBM, where he was instrumental in the introduction of RISC architecture. Before joining TeleHubLink, he was President and CEO of wirelessEncryption.com, where he invented and developed telecom security.

Bibliographic information