• Complain

Jim Doherty - Wireless and Mobile Device Security

Here you can read online Jim Doherty - Wireless and Mobile Device Security full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Jones & Bartlett Learning, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Wireless and Mobile Device Security
  • Author:
  • Publisher:
    Jones & Bartlett Learning
  • Genre:
  • Year:
    2021
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Wireless and Mobile Device Security: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Wireless and Mobile Device Security" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

The world of wireless and mobile devices is evolving rapidly, with many individuals relying solely on their wireless devices in the workplace and in the home. The growing use of mobile devices demands that organizations become more educated in securing this technology and determining how to best protect their assets. Written by an industry expert, Wireless and Mobile Device Security, Second Edition explores the evolution of wired networks to wireless networking and its impact on the corporate world. Using case studies and real-world events, it goes on to discuss risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches. KEY FEATURES Available with Cybersecurity Cloud Labs, providing immersive mock IT infrastructures where students can learn and practice foundational cybersecurity skills. Discusses the history and evolution of wireless networks, including emerging trends in 5G connectivity and IOT Explores the impact of wireless on the corporate world Focuses on 802.11 WLAN security in both the small office/home office world and for larger organizations Offers security solutions for the risks and vulnerabilities in mobile devices Surveys the mobile malware landscape and discusses mitigation strategies

Jim Doherty: author's other books


Who wrote Wireless and Mobile Device Security? Find out the surname, the name of the author of the book and a list of all author's works by series.

Wireless and Mobile Device Security — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Wireless and Mobile Device Security" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Landmarks
List of Figures
List of tables
ISSA INFORMATION SYSTEMS SECURITY ASSURANCE SERIES Wireless and Mobile - photo 1

ISSA

INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES

Wireless and Mobile Device Security

SECOND EDITION

Jim Doherty

JONES BARTLETT LEARNING World Headquarters Jones Bartlett Learning 25 - photo 2
JONES & BARTLETT
LEARNING

World Headquarters Jones Bartlett Learning 25 Mall Road Burlington MA 01803 - photo 3

World Headquarters

Jones & Bartlett Learning

25 Mall Road

Burlington, MA 01803

978-443-5000

www.jblearning.com

Jones & Bartlett Learning books and products are available through most bookstores and online booksellers. To contact Jones & Bartlett Learning directly, call 800-832-0034, fax 978-443-8000, or visit our website, www.jblearning.com.

Substantial discounts on bulk quantities of Jones & Bartlett Learning publications are available to corporations, professional associations, and other qualified organizations. For details and specific discount information, contact the special sales department at Jones & Bartlett Learning via the above contact information or send an email to .

Copyright 2022 by Jones & Bartlett Learning, LLC, an Ascend Learning Company

All rights reserved. No part of the material protected by this copyright may be reproduced or utilized in any form, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the copyright owner.

The content, statements, views, and opinions herein are the sole expression of the respective authors and not that of Jones & Bartlett Learning, LLC. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not constitute or imply its endorsement or recommendation by Jones & Bartlett Learning, LLC and such reference shall not be used for advertising or product endorsement purposes. All trademarks displayed are the trademarks of the parties noted herein. Wireless and Mobile Device Security, 2ndEdition is an independent publication and has not been authorized, sponsored, or otherwise approved by the owners of the trademarks or service marks referenced in this product.

There may be images in this book that feature models; these models do not necessarily endorse, represent, or participate in the activities represented in the images. Any screenshots in this product are for educational and instructive purposes only. Any individuals and scenarios featured in the case studies throughout this product may be real or fictitious, but are used for instructional purposes only.

Production Credits

Director of Product Management: Laura Pagluica

Product Manager: Edward Hinman

Content Strategist: Melissa Duffy

Content Coordinator: Paula-Yuan Gregory

Manager, Project Management: Jessica deMartin

Project Specialist: Allie Koo

Senior Digital Project Specialist: Angela Dooley

Digital Project Specialist: Rachel DiMaggio

Marketing Manager: Michael Sullivan

Product Fulfillment Manager: Wendy Kilborn

Technical Editor: Justin Hensley

Composition: S4Carlisle Publishing Services

Project Management: S4Carlisle Publishing Services

Cover Design: Briana Yates

Text Design: Briana Yates

Media Development Editor: Faith Brosnan

Rights Specialist: James Fortney

Cover Image (Title Page, Part Opener, Chapter Opener): Cherezoff/Shutterstock

Printing and Binding: Gasch Printing

Library of Congress Cataloging-in-Publication Data

Names: Doherty, Jim, 1968- author.

Title: Wireless and mobile device security / Jim Doherty, Professor

Description: Second edition. | Burlington, Massachusetts : Jones & Bartlett Learning, [2022] | Series: Issa | Includes bibliographical references and index.

Identifiers: LCCN 2020043841 | ISBN 9781284211726 (paperback)

Subjects: LCSH: Wireless communication systems--Security measures. | Mobile communication systems--Security measures. | Wireless LANs--Security

measures. | Mobile computing--Security measures.

Classification: LCC TK5105.78 .D64 2022 | DDC 005.8--dc23

LC record available at https://lccn.loc.gov/2020043841

6048

Printed in the United States of America

25 24 23 22 21 10 9 8 7 6 5 4 3 2

To Katie, Samantha, and Conor

CherezoffShutterstock Contents CherezoffShutterstock Preface Purpose of This - photo 4

Cherezoff/Shutterstock

Contents
CherezoffShutterstock Preface Purpose of This Book This book is part of the - photo 5

Cherezoff/Shutterstock

Preface
Purpose of This Book

This book is part of the Information Systems Security & Assurance Series from Jones & Bartlett Learning (www.jblearning.com). Designed for courses and curriculums in IT Security, Cybersecurity, Information Assurance, and Information Systems Security, this series features a comprehensive, consistent treatment of the most current thinking and trends in this critical subject area. These titles deliver fundamental information security principles packed with real-world applications and examples. Authored by professionals experienced in information systems security, they deliver comprehensive information on all aspects of the topic. Reviewed word for word by leading technical experts in the field, these books are not just current but forward-thinkingputting you in the position to solve current cybersecurity challenges and future ones, as well.

Part I of the text reviews the history of wireless and mobile networks and the evolution of wired and wireless networkingfrom Alexander Graham Bell to the present bring-your-own-device (BYOD) phenomenon. Youll read about the mobile revolution that took users from clunky analog phones to smart devices people cant live without and about the implications of the always on, ever-present aspect of these devices. Although most people view the resulting changes as a net positive, both wireless and mobile networking have introduced significant security vulnerabilities to networking in general. Youll get an overview of network security threats and considerations, with a particular emphasis on wireless and mobile devices.

Part II focuses on wireless local area network (WLAN) security. Youll read about WLAN design and the operation and behavior of wireless in general, particularly on 802.11 WLANs. Youll review the threats and vulnerabilities directly associated with 802.11 wireless networks, their various topologies, and devices. The text will discuss basic security measures that satisfy the needs of small office/home office (SOHO) networks, as well as more advanced concepts in wireless security unique to the needs of larger organizations. Youll learn about the need to audit and monitor a WLAN and the tools available for doing so. Finally, youll review risk assessment procedures as applied to WLAN and Internet Protocol mobility.

Part III discusses security solutions to the risks and vulnerabilities of wireless networks and mobile devices. Youll read about the three major mobile operating systems and the vulnerabilities of each. Then youll review the security models of these operating systems and explore how IT organizations manage the security and control of smart devices on a large scale. The text will look at the risks mobile clients present to corporate networks, as well as the tools and techniques used to mitigate these risks. Youll also learn about the issues surrounding fingerprinting of mobile devices. Finally, youll review the mobile malware landscape and mitigation strategies to prevent malware from finding its way into an organizations information security resources.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Wireless and Mobile Device Security»

Look at similar books to Wireless and Mobile Device Security. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Wireless and Mobile Device Security»

Discussion, reviews of the book Wireless and Mobile Device Security and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.