"Mobile VPN", Alex Shneyderman/Alessio Casati, 2003, 0-471-21901-0,
%A Alex Shneyderman
%A Alessio Casati
%C 5353 Dundas Street West, 4th Floor, Etobicoke, ON M9B 6H8
%I John Wiley & Sons, Inc.
%O U$45.00/C$69.95/UK#33.50 416-236-4433 fax: 416-236-4448
%P 330 p.
%T "Mobile VPN"
Part one presents wireless data fundamentals. Chapter one gives an
introduction to mobile virtual private networks (MVPN), and the
emphasis on cellular technology points out that the authors are
familiar with the telecommunications, rather than security, field of
work. The material contains a weak suggestion that MVPNs may be
useful, lots of alphabet soup, and very little in the way of
conceptual background. The data networking technologies in chapter
two are not explained very clearly: basic ideas get bogged down with
details. Cellular radio interfaces are listed in chapter three, with
data services that can be provided over cellular networks in chapter
Part two looks at MVPN and advanced wireless data services. MVPN
fundamentals, in chapter five, basically reiterates the text from
chapter two, with a little extra emphasis on virtual private networks.
Chapter six describes various GSM (Global System for Mobile
communications)/GPRS (General Packet Radio Service) and UMTS
(Universal Mobile Telecommunication System) offerings. Options for
CDMA2000 (Code Division Multiple Access) are listed in chapter seven.
Chapter eight explains MVPN equipment components and requirements.
Possible developments in mobile VPN are advanced in chapter nine.
This book once again emphasizes the divide not only between the
cellular and wireless LAN camps, but also between communications and
security. It fails to bring all the related technologies together
between two covers. At the same time, for those in the LAN or
security fields who need to know about cellular service offerings,
this work does not provide a consistent level of explanation and depth
of background for those issues. Possible utilities are tabulated, but
these could be obtained from almost any cell company sales office.
copyright Robert M. Slade, 2003 BKMBLVPN.RVW 20030401
rslade@... rslade@... slade@... p1@...
"If you do buy a computer, don't turn it on." - Richards' 2nd Law
============= for back issues:
[Base URL] site http://victoria.tc.ca/techrev/
or mirror http://sun.soci.niu.edu/~rslade/
CISSP refs: [Base URL]mnbksccd.htm
Security Dict.: [Base URL]secgloss.htm
Security Educ.: [Base URL]comseced.htm
Book reviews: [Base URL]mnbk.htm
Security Educ.: http://groups.yahoo.com/group/comseced/
Review mailing list: send mail to email@example.com