Fr. 207.00

Guide to Wireless Network Security

English · Hardback

Shipping usually within 6 to 7 weeks

Description

Read more

1. INTRODUCTION With the increasing deployment of wireless networks (802. 11 architecture) in enterprise environments, IT enterprises are working to implement security mechanisms that are equivalent to those existing today for wire-based networks. An important aspect of this is the need to provide secure access to the network for valid users. Existing wired network jacks are located inside buildings already secured from unauthorized access through the use of keys, badge access, and so forth. A user must gain physical access to the building in order to plug a client computer into a network jack. In contrast, a wireless access point (AP) may be accessed from off the premises if the signal is detectable (for instance, from a parking lot adjacent to the building). Thus, wireless networks require secure access to the AP and the ability to isolate the AP from the internal private network prior to user authentication into the network domain. Furthermore, as enterprises strive to provide better availability of mission-critical wireless data, they also face the challenge of maintaining that data's security and integrity. While each connection with a client, a supplier or a enterprise partner can improve responsiveness and efficiency, it also increases the vulnerability of enterprise wireless data to attack. In such an environment, wireless network security is becoming more important every day. Also, with the growing reliance on e-commerce, wireless network-based services and the Internet, enterprises are faced with an ever-increasing responsibility to protect their systems from attack.

List of contents

Overview of Wireless Network Security Technology.- Wireless Network Security Fundamentals.- Types of Wireless Network Security Technology.- Standards.- Enhanced Security for Wireless Lans and Wans in the Enterprise: Hands on.- Handling Wireless Private Information.- Designing Wireless Network Security.- Wireless Network Security Design Issues.- Cost Justification and Consideration.- Standards Design Issues.- Authenticating Architectural Design Considerations.- Planning for Wireless Network Security.- Implementation Plan Development.- Wireless Network Security Planning Techniques.- Installing and Deploying Wireless Network Security.- Testing Techniques.- Internetworking Wireless Security.- Installation and Deployment.- Securing Your Wireless E-Commerce Storefront.- Certification of Wireless Network Security Performance.- Maintaining Wireless Network Security.- Configuring Secure Access.- Management of Wireless Network Security.- Ongoing Maintenance.- Standards Development.- Ensuring Site Integrity.- Information Warfare Countermeasures: The Wireless Network Security Solution.- Defensive Wireless Network Security Strategies for Governments and Industry Groups.- The Information Warfare Wireless Network Security Arsenal and Tactics of the Military.- The Information Warfare Wireless Network Security Arsenal and Tactics of Terrorists and Rogues.- The Information Warfare Wireless Network Security Arsenal and Tactics of Private Enterprises.- The Information Warfare Wireless Network Security Arsenal of the Future.- Wireless Network Security Surveillance Tools for Information Warfare of the Future.- Civilian Casualties: The Victims and Refugees of Information Warfare Wireless Network Security.- Wireless Network Security Solutions and Future Directions.- Providing Wireless Network Security Solutions for ISP Intranet, Internet and E-Commerce.- Enhancing Wireless Web Server Security.- Wireless Network Security Solutions for Consideration.- Summary, Conclusions and Recommendations.

Summary

1. INTRODUCTION With the increasing deployment of wireless networks (802. 11 architecture) in enterprise environments, IT enterprises are working to implement security mechanisms that are equivalent to those existing today for wire-based networks. An important aspect of this is the need to provide secure access to the network for valid users. Existing wired network jacks are located inside buildings already secured from unauthorized access through the use of keys, badge access, and so forth. A user must gain physical access to the building in order to plug a client computer into a network jack. In contrast, a wireless access point (AP) may be accessed from off the premises if the signal is detectable (for instance, from a parking lot adjacent to the building). Thus, wireless networks require secure access to the AP and the ability to isolate the AP from the internal private network prior to user authentication into the network domain. Furthermore, as enterprises strive to provide better availability of mission-critical wireless data, they also face the challenge of maintaining that data's security and integrity. While each connection with a client, a supplier or a enterprise partner can improve responsiveness and efficiency, it also increases the vulnerability of enterprise wireless data to attack. In such an environment, wireless network security is becoming more important every day. Also, with the growing reliance on e-commerce, wireless network-based services and the Internet, enterprises are faced with an ever-increasing responsibility to protect their systems from attack.

Product details

Authors John R Vacca, John R. Vacca
Publisher Springer, Berlin
 
Languages English
Product format Hardback
Released 07.07.2006
 
EAN 9780387954257
ISBN 978-0-387-95425-7
No. of pages 848
Dimensions 182 mm x 239 mm x 64 mm
Weight 1564 g
Illustrations XXIII, 848 p.
Subjects Natural sciences, medicine, IT, technology > IT, data processing > Data communication, networks
Social sciences, law, business > Media, communication > Communication science

Kommunikationswissenschaft, Informatik, Codierung, C, Datenschutz, Algorithmen und Datenstrukturen, Netzwerksicherheit, Server, Verschlüsselung, Kryptografie, Kryptologie, Algorithmus, Kodierungstheorie und Verschlüsselung (Kryptologie), COMPUTERS / Information Theory, Wartung und Reparaturen, IT, Netzwerk (elektronisch), Netzwerk-Hardware, Internet / Client/Server, Drahtlostechnologie, Kryptografie, Verschlüsselungstechnologie, Informationstheorie, Datenverarbeitung / Datenverschlüsselung, Kryptografie, COMPUTERS / Security / General, Datensicherheit / Netz, COMPUTERS / Networking / General, Kode, Code - Barcode, computer science, Wireless LAN - WLAN, Lokales Netzwerk (EDV) / Wireless LAN, computer hardware, Data Structures and Information Theory, Computer Communication Networks, Algorithms & data structures, Coding and Information Theory, Information theory, Coding theory & cryptology, Coding theory, Computer Engineering and Networks, Computer Systems Organization and Communication Networks, Computer organization, Data structures (Computer science), Data encryption, Data encryption (Computer science), Cryptology, Computer communication systems, Computer networking & communications

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.