Read more
Informationen zum Autor BRIAN CARTER, CISSP, CSS-1, is a former intelligence analyst for both the military and law enforcement who currently works as an Information Protection Analyst for NatCity Investments, handling firewalls, intrusion detection systems, cryptography, and security architecture.RUSSELL SHUMWAY, CISSP, is a Principal Consultant at Guardent. He was previously the Technical Director of Global Integrity Corporation's REACT program, where he provided incident response services for clients worldwide. Russell is the coauthor of Incident Response. Klappentext Wireless Security End to End is a comprehensive guide covering encryption, PKI, SSL, third party certificate validation, Smart card, pin authentication, device level security, threat analysis, strategies for developing a wireless security solution and a look ahead at future biometric technology all in the End to End series targeted at real-world professionals.Wireless Security End to End is being done in the End to End series, a new series dedicated to cutting-edge technologies designed to provide proven solutions, real-world tips and best practices. The End to End series takes a no "techno-babble" modular approach in explaining cutting edge wireless technology. Special features include case studies, real-life implementations and wireless decision tree. Zusammenfassung Wireless Security End to End is a comprehensive guide covering encryption! PKI! SSL! third party certificate validation! Smart card! pin authentication! device level security! threat analysis! strategies for developing a wireless security solution and a look ahead at future biometric technology all in the End to End series targeted at real-world professionals.Wireless Security End to End is being done in the End to End series! a new series dedicated to cutting-edge technologies designed to provide proven solutions! real-world tips and best practices. The End to End series takes a no "techno-babble" modular approach in explaining cutting edge wireless technology. Special features include case studies! real-life implementations and wireless decision tree. Inhaltsverzeichnis Preface.Part I: Introduction to Wireless Network Security.Chapter 1: Introduction to Wireless Networking.Chapter 2: Wireless Threat Analysis.Chapter 3: Behind the Threat.Part II: Network Security Components.Chapter 4: The Network Security Model.Chapter 5: Network Intrusion Protection.Chapter 6: Network Intrusion Detection.Chapter 7: Host-Based Security.Chapter 8: Virtual Private Networking.Chapter 9: Event Correlation.Part III: Wireless Security Components.Chapter 10: Secure Configuration.Chapter 11: Secure Authentication.Chapter 12: Encryption.Chapter 13: Wireless Device Placement.Part IV: Integrating Wireless Access into the Network Security Process.Chapter 14: Logging Wireless Events.Chapter 15: Policy Issues.Chapter 16: Assessing Wireless Network Security.Chapter 17: Change Control and Device Administration.Part V: Wireless Security Models.Chapter 18: Cisco Implementation with LEAP.Chapter 19: WLAN Authentication and Key Management with RADIUS.Chapter 20: Wireless Access with IPSEC.Chapter 21: Secure Wireless Public Access.Chapter 22: Secure Wireless Point-to-Point Connectivity.Appendix A: Glossary of Terms.Appendix B: Web Site References.Index....