By Johnny Cache and William Liu; Reviewed by Lewis E. “Lew” Wagner III, CPP, CAS
Learn the dos and don'ts of using wireless infrastructures so hackers can't compromise your personal data.
Those who use wireless-enabled (WiFi) notebooks or smart phones know that checking a junk e-mail account from a “hotspot” at Starbucks is one thing, but online banking there would be foolish. Hackers know how to sniff out weak WiFi networks to attack and steal critical data.
So how do hackers achieve their objective? Co-authors Johnny Cache (a pen name) and William Liu provide the answers—along with defense mechanisms—in a highly detailed, accessible text about threats to the world’s increasingly critical wireless infrastructure.
The concepts presented in this book are all cutting-edge issues, starting with IEEE 802.11, the primary technical standard for WiFi data networks, on up to Bluetooth wireless telephone technology. The authors describe how hackers spot weak WiFi networks or peripherals, then break in. Later, Cache, whose real name is Jon Ellch, and Liu address the additional security challenges involving authentication and data encryption.
The book is well organized, and referenced so that a reader with a specific problem or area of interest can find exactly what he or she wants via the index, table of contents, or simply by thumbing through the chapters. Thankfully, the prose itself is less wordy than your typical IT security text. The authors also provide ample, current references and bibliography items should the reader need more information on any of the issues discussed in the book.
Cache holds a master’s degree from the Naval Postgraduate School, where he won the school’s annual award for the most innovative computer science thesis, writing about 802.11 security. Liu is managing director of Stach & Liu, an IT security consulting firm serving Fortune 500 clients
Wireless Hacking Exposed: Wireless Security Secrets and Solutions will benefit IT specialists and security generalists. (Published by McGraw-Hill Osborne Media, www.mhprofes-sional.com (Web); 386 pages, $49.99.)
Reviewer: Lewis E. “Lew” Wagner III, CPP, CAS (Certified Antiterrorism Specialist), CISSP (Certified Information Systems Security Professional), is president and CEO of Dynamic Defense in Depth, Inc., of Glen Allen, Virginia, and is a member of the ASIS Information Security Council.