Wireless and Mobile Device Security
- 8h 21m
- Jim Doherty
- Jones and Bartlett Learning
- 2016
The world of wireless and mobile devices is evolving day-to-day, with many individuals relying solely on their wireless devices in the workplace and in the home. The growing use of mobile devices demands that organizations become more educated in securing this growing technology and determining how to best protect their assets. Written by an industry expert, Wireless and Mobile Device Security explores the evolution of wired networks to wireless networking and its impact on the corporate world. Using case studies and real-world events, it goes on to discuss risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches. The text closes with a look at the policies and procedures in place and a glimpse ahead at the future of wireless and mobile device security.
About the Author
Jim Doherty is the Sr. Vice President of Marketing Officer at Ixia. Jim has lead held marketing, sales and engineering leadership positions at Certes Networks, Motorola, Cisco Systems and Ericsson during a 19-year career in the networking and communications sectors. Jim has made a name for himself in the industry due to his ability to explain networking technologies to non-technical audiences in a way that still satisfies technical professionals. He has extensive speaking and presenting experience and if often sought out to explain networking and communication technologies to non-technical audiences.
Jim is also the creator and co-author of the “Networking Simplified” series of books, and a comprehensive set of CCNA study notes; published in a number of certification guides.
Jim holds a B.S. in electrical engineering from N.C. State University,and an MBA from Duke University. Before earning his degrees Jim served in the US Marine Corps obtaining the rank of Sergeant.
In this Book
-
The Evolution of Data Networks
-
The Evolution of Wired Networking to Wireless Networking
-
The Mobile Revolution
-
Security Threats Overview—Wired, Wireless, and Mobile
-
How Do WLANs Work?
-
WLAN and IP Networking Threat and Vulnerability Analysis
-
Basic WLAN Security Measures
-
Advanced WLAN Security Measures
-
WLAN Auditing Tools
-
WLAN and IP Network Risk Assessment
-
Mobile Communication Security Challenges
-
Mobile Device Security Models
-
Mobile Wireless Attacks and Remediation
-
Fingerprinting Mobile Devices
-
Mobile Malware and Application-Based Threats
-
References