Fr. 236.00

Wireless Security Handbook

Inglese · Copertina rigida

Spedizione di solito entro 1 a 3 settimane (non disponibile a breve termine)

Descrizione

Ulteriori informazioni

Informationen zum Autor Aaron E. Earle Klappentext The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives! including those of an auditor! security architect! and hacker. This wide scope benefits anyone who has to administer! secure! hack! or conduct business on a wireless network. This text tackles wireless risk from many angles. It discusses the mitigation of wireless risk at the policy level! cost-effective ways of deploying wireless across large enterprises! and financial controls that reduce unforeseen risks in wireless projects. The handbook also offers the technical details of how you can design! build! and hack nearly all wireless security components. Zusammenfassung Presents an overview of wireless network security. This book examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker. It discusses the mitigation of wireless risk at the policy level, and cost-effective ways of deploying wireless across large enterprises. Inhaltsverzeichnis Wireless Network Overview RF Overview Wireless Signal PropagationSignal-to-Noise RatioModulation Wireless Groups Risks and Threats of WirelessGoals of Information SecurityAnalysisSpoofing Denial of ServiceMalicious CodeSocial EngineeringRogue Access PointsCell Phone SecurityWireless Hacking and Hackers RFID The Legality of Computer Crime Electronic Communications Privacy Act Computer Fraud and Abuse ActState Computer Crime Issues Wireless Physical Layer TechnologiesISM SpectrumFrequency Hopping Spread Spectrum (FHSS) Direct Sequence Spread Spectrum (DSSS)Orthogonal Frequency Division Multiplexing (OFDM) Wireless Management FramesBeaconProbe Request Probe ResponseAuthenticationAssociation Request Association ResponseDisassociation and De-Authentication CSMA/CAFragmentation Distributed Coordination Function Point Coordination Function Interframe SpacingService Set Identifier (SSID)Wireless Local and Personal Area Networks Ad Hoc Mode Infrastructure Mode BridgingRepeaterMesh Wireless NetworksLocal Area Networking Standards Personal Area Network (PAN) 802.15 Wide Area Wireless TechnologiesCell Phone TechnologiesGPS 802.16 Air Interface Standard 802.20 Standard Wireless Antenna Theory RF Antenna OverviewFresnel ZoneAntenna TypesConnectors The Wireless Deployment Process Gather Requirements EstimationMake the Business CaseSite SurveyDesign StagingDeployment and InstallationCertificationAudit Wireless Access Points Linksys Access Points Cisco Access PointsWireless End Devices LaptopsTablets PDA DevicesHandheld Scanners Smart Phones Wi-Fi Phones Wireless LAN Security Wireless LAN Security HistoryAuthenticationSSID Wireless Security Basics Equivalent Privacy Standard (WEP) 802.1x Remote Authentication Dial-In User Service (RADIUS)Extensible Authentication Protocol (EAP) Wi-Fi Protected Access (WPA) 802.11iWi-Fi Protected Access (WPA2) WLAN Authentication and Privacy Infrastructure (WAPI) Rogue Access Points Detection Breaking Wireless SecurityThe Hacking Process Wireless Network Compromising TechniquesAccess Point Compromising TechniquesWireless Security PolicyPolicy OverviewThe Policy-Writing Process Risk AssessmentImpact AnalysisWireless Security Policy Areas Wireless Security Architectures Static WEP Wireless Architecture VPN Wireless VPN Architecture OverviewVPN Policy AspectWireless Gateway Systems 802.1x Comparing Wireless Security ArchitecturesWireless ToolsScanning ToolsSniffing Tools Hybrid Tools Denial-of-Service Tools Cracking Tools Access Point Attacking ToolsOther Wireless Security Tools Appendix A: Review Question Answers ...

Dettagli sul prodotto

Autori Earle Aaron E, Aaron E. Earle, Aaron E. (Ae&e Corporation Earle, Earle Aaron E.
Editore Taylor & Francis Ltd.
 
Lingue Inglese
Formato Copertina rigida
Pubblicazione 16.12.2005
 
EAN 9780849333781
ISBN 978-0-8493-3378-1
Pagine 382
Categorie Scienze naturali, medicina, informatica, tecnica > Informatica, EDP > Internet

Data encryption, COMPUTERS / Security / Cryptography & Encryption

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.