Fr. 236.00

Wireless Security Handbook

English · Hardback

Shipping usually within 1 to 3 weeks (not available at short notice)

Description

Read more

Informationen zum Autor Aaron E. Earle Klappentext The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives! including those of an auditor! security architect! and hacker. This wide scope benefits anyone who has to administer! secure! hack! or conduct business on a wireless network. This text tackles wireless risk from many angles. It discusses the mitigation of wireless risk at the policy level! cost-effective ways of deploying wireless across large enterprises! and financial controls that reduce unforeseen risks in wireless projects. The handbook also offers the technical details of how you can design! build! and hack nearly all wireless security components. Zusammenfassung Presents an overview of wireless network security. This book examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker. It discusses the mitigation of wireless risk at the policy level, and cost-effective ways of deploying wireless across large enterprises. Inhaltsverzeichnis Wireless Network Overview RF Overview Wireless Signal PropagationSignal-to-Noise RatioModulation Wireless Groups Risks and Threats of WirelessGoals of Information SecurityAnalysisSpoofing Denial of ServiceMalicious CodeSocial EngineeringRogue Access PointsCell Phone SecurityWireless Hacking and Hackers RFID The Legality of Computer Crime Electronic Communications Privacy Act Computer Fraud and Abuse ActState Computer Crime Issues Wireless Physical Layer TechnologiesISM SpectrumFrequency Hopping Spread Spectrum (FHSS) Direct Sequence Spread Spectrum (DSSS)Orthogonal Frequency Division Multiplexing (OFDM) Wireless Management FramesBeaconProbe Request Probe ResponseAuthenticationAssociation Request Association ResponseDisassociation and De-Authentication CSMA/CAFragmentation Distributed Coordination Function Point Coordination Function Interframe SpacingService Set Identifier (SSID)Wireless Local and Personal Area Networks Ad Hoc Mode Infrastructure Mode BridgingRepeaterMesh Wireless NetworksLocal Area Networking Standards Personal Area Network (PAN) 802.15 Wide Area Wireless TechnologiesCell Phone TechnologiesGPS 802.16 Air Interface Standard 802.20 Standard Wireless Antenna Theory RF Antenna OverviewFresnel ZoneAntenna TypesConnectors The Wireless Deployment Process Gather Requirements EstimationMake the Business CaseSite SurveyDesign StagingDeployment and InstallationCertificationAudit Wireless Access Points Linksys Access Points Cisco Access PointsWireless End Devices LaptopsTablets PDA DevicesHandheld Scanners Smart Phones Wi-Fi Phones Wireless LAN Security Wireless LAN Security HistoryAuthenticationSSID Wireless Security Basics Equivalent Privacy Standard (WEP) 802.1x Remote Authentication Dial-In User Service (RADIUS)Extensible Authentication Protocol (EAP) Wi-Fi Protected Access (WPA) 802.11iWi-Fi Protected Access (WPA2) WLAN Authentication and Privacy Infrastructure (WAPI) Rogue Access Points Detection Breaking Wireless SecurityThe Hacking Process Wireless Network Compromising TechniquesAccess Point Compromising TechniquesWireless Security PolicyPolicy OverviewThe Policy-Writing Process Risk AssessmentImpact AnalysisWireless Security Policy Areas Wireless Security Architectures Static WEP Wireless Architecture VPN Wireless VPN Architecture OverviewVPN Policy AspectWireless Gateway Systems 802.1x Comparing Wireless Security ArchitecturesWireless ToolsScanning ToolsSniffing Tools Hybrid Tools Denial-of-Service Tools Cracking Tools Access Point Attacking ToolsOther Wireless Security Tools Appendix A: Review Question Answers ...

Product details

Authors Earle Aaron E, Aaron E. Earle, Aaron E. (Ae&e Corporation Earle, Earle Aaron E.
Publisher Taylor & Francis Ltd.
 
Languages English
Product format Hardback
Released 16.12.2005
 
EAN 9780849333781
ISBN 978-0-8493-3378-1
No. of pages 382
Subjects Natural sciences, medicine, IT, technology > IT, data processing > Internet

Data encryption, COMPUTERS / Security / Cryptography & Encryption

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.