Loading ...
Sorry, an error occurred while loading the content.

REVIEW: "Wireless Hacks", Rob Flickenger

Expand Messages
  • Rob, grandpa of Ryan, Trevor, Devon & Ha
    BKWLSHCK.RVW 20031110 Wireless Hacks , Rob Flickenger, 2003, 0-596-00559-8, U$24.95/C$38.95 %A Rob Flickenger %C 103 Morris Street, Suite A, Sebastopol,
    Message 1 of 1 , Jan 16, 2004
      BKWLSHCK.RVW 20031110

      "Wireless Hacks", Rob Flickenger, 2003, 0-596-00559-8, U$24.95/C$38.95
      %A Rob Flickenger
      %C 103 Morris Street, Suite A, Sebastopol, CA 95472
      %D 2003
      %G 0-596-00559-8
      %I O'Reilly & Associates, Inc.
      %O U$24.95/C$38.95 707-829-0515 fax: 707-829-0104 nuts@...
      %O http://www.amazon.com/exec/obidos/ASIN/0596005598/robsladesinterne
      %O http://www.amazon.ca/exec/obidos/ASIN/0596005598/robsladesin03-20
      %P 286 p.
      %T "Wireless Hacks"

      Unlike most pieces that simply list the various wireless standards,
      chapter one provides excellent coverage of both regulations and
      protocols, giving clear and practical explanations of the benefits and
      drawbacks of the various conventions, and recommending the best one
      for any particular purpose. This sets the tone for the book as a
      whole, providing advice and information that far exceeds details and
      suggestions found in other wireless works. (I must say, though, that
      the exegesis of Direct Sequence Spread Spectrum and Frequency Hopping
      Spread Spectrum is still lacking.) Chapter two shows how to use
      Bluetooth (mostly with cell phones, Mac OS X, and Linux) for some
      amazing applications. Descriptions of many monitoring tools are
      furnished in chapter three, starting with system utilities. There is
      solid guidance on using these instruments in combination for best
      effect. Antennae, cables, and the use of minimalist equipment as
      routers and infrastructure is covered in chapter four. Five deals
      with antennae in more detail. Long distance point-to-point links are
      examined in chapter six. Wireless security, in chapter seven,
      discusses the usual WEP (Wired Equivalent Privacy) cracks and SSID
      (Station Set IDentifier) issues, but also reviews SSH (Secure SHell)
      and tunnelling.

      For anyone dealing seriously with wireless networks, there is a wealth
      of information collected here that you will only find elsewhere after
      prolonged searching.

      copyright Robert M. Slade, 2003 BKWLSHCK.RVW 20031110

      ====================== (quote inserted randomly by Pegasus Mailer)
      rslade@... slade@... rslade@...
      A witty saying proves nothing. - Voltaire
      http://victoria.tc.ca/techrev or http://sun.soci.niu.edu/~rslade
    Your message has been successfully submitted and would be delivered to recipients shortly.