(Downloads - 0)
For more info about our services contact : help@bestpfe.com
Table of contents
CHAPTER ONE: Introduction
1.1 The need for electromagnetic spectrum
1.2 Benefits of wireless technology
1.3 Wireless networks
1.4 Wireless devices
1.5 Wireless LAN overview
1.6 Benefits
1.7 Wireless Personal Area Networks (WPAN)
1.8 Wireless Wide Area Network (WWAN)
1.9 Cellular generations
1.10 Second to Third Generation bridge
1.11 Third Generation
1.12 Fourth Generation
CHAPTER TWO: Security Aspects of the Wireless Systems
2.1 Need for security
2.2 Attacks on wireless networks
2.3 Classification of security attacks
2.4 An ideal security system
2.5 Wired Equivalent Privacy (WEP) protocol
2.6 Flaws in the WEP scheme
2.7 Mobile IP
2.8 Virtual Private Network (VPN)
2.8 Protocols associated with VPN
CHAPTER THREE: What is a Malware?
3.1 Virus
3.2 Worms programs
3.3 Hoaxes
3.4 Trojans
3.5 Potentially unwanted programs
3.6 A look at mobile viruses
3.7 PALM OS viruses
3.8 Overview of threats and possible damage
CHAPTER FOUR: Threat Assessment
4.1 Countermeasures
4.2 What is an antivirus?
4.3 Symantec’s solution for handhelds
4.4 F-Secure solution
4.5 McAfee solution
4.6 Trend Micro’s virus/malicious code protection solution
4.7 Security measures for WLANs
4.8 Preventive measures to avoid mobile viruses
4.9 The future of Wireless devices and Viruses
CHAPTER FIVE: Conclusion & Suggestion
References


