Wireless Security Handbook
The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker. This wide scope benefits anyone who has to administer, secure, hack, or conduct business on a...
Đã lưu trong:
Tác giả chính: | |
---|---|
Định dạng: | Sách |
Ngôn ngữ: | English |
Được phát hành: |
CRC Press
2009
|
Truy cập trực tuyến: | http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1438 |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Thư viện Trường Đại học Đà Lạt |
---|
id |
oai:scholar.dlu.edu.vn:DLU123456789-1438 |
---|---|
record_format |
dspace |
spelling |
oai:scholar.dlu.edu.vn:DLU123456789-14382009-12-02T07:54:15Z Wireless Security Handbook Earle, Aaron The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker. This wide scope benefits anyone who has to administer, secure, hack, or conduct business on a wireless network. This text tackles wireless risk from many angles. It discusses the mitigation of wireless risk at the policy level, cost-effective ways of deploying wireless across large enterprises, and financial controls that reduce unforeseen risks in wireless projects. The handbook also offers the technical details of how you can design, build, and hack nearly all wireless security components. This volume also helps advance your career by covering all of the objectives of the three widely recognized wireless certifications--those administered by Planet3 Wireless and Cisco Systems. The book focuses on the wireless local area networking technologies that help you meet these objectives, while also analyzing almost all other facets of mobile communications. Wireless Network Overview RF Overview Wireless Signal Propagation Signal-to-Noise Ratio Modulation Wireless Groups Risks and Threats of Wireless Goals of Information Security Analysis Spoofing Denial of Service Malicious Code Social Engineering Rogue Access Points Cell Phone Security Wireless Hacking and Hackers RFID The Legality of Computer Crime Electronic Communications Privacy Act Computer Fraud and Abuse Act State Computer Crime Issues Wireless Physical Layer Technologies ISM Spectrum Frequency Hopping Spread Spectrum (FHSS) Direct Sequence Spread Spectrum (DSSS) Orthogonal Frequency Division Multiplexing (OFDM) Wireless Management Frames Beacon Probe Request Probe Response Authentication Association Request Association Response Disassociation and De-Authentication CSMA/CA Fragmentation Distributed Coordination Function Point Coordination Function Interframe Spacing Service Set Identifier (SSID) Wireless Local and Personal Area Networks Ad Hoc Mode Infrastructure Mode Bridging Repeater Mesh Wireless Networks Local Area Networking Standards Personal Area Network (PAN) 802.15 Wide Area Wireless Technologies Cell Phone Technologies GPS 802.16 Air Interface Standard 802.20 Standard Wireless Antenna Theory RF Antenna Overview Fresnel Zone Antenna Types Connectors The Wireless Deployment Process Gather Requirements Estimation Make the Business Case Site Survey Design Staging Deployment and Installation Certification Audit Wireless Access Points Linksys Access Points Cisco Access Points Wireless End Devices Laptops Tablets PDA Devices Handheld Scanners Smart Phones Wi-Fi Phones Wireless LAN Security Wireless LAN Security History Authentication SSID Wireless Security Basics Equivalent Privacy Standard (WEP) 802.1x Remote Authentication Dial-In User Service (RADIUS) Extensible Authentication Protocol (EAP) Wi-Fi Protected Access (WPA) 802.11i Wi-Fi Protected Access (WPA2) WLAN Authentication and Privacy Infrastructure (WAPI) Rogue Access Points Detection Breaking Wireless Security The Hacking Process Wireless Network Compromising Techniques Access Point Compromising Techniques Wireless Security Policy Policy Overview The Policy-Writing Process Risk Assessment Impact Analysis Wireless Security Policy Areas Wireless Security Architectures Static WEP Wireless Architecture VPN Wireless VPN Architecture Overview VPN Policy Aspect Wireless Gateway Systems 802.1x Comparing Wireless Security Architectures Wireless Tools Scanning Tools Sniffing Tools Hybrid Tools Denial-of-Service Tools Cracking Tools Access Point Attacking Tools Other Wireless Security Tools Appendix A: Review Question Answers 2009-12-02T07:54:15Z 2009-12-02T07:54:15Z 2005 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1438 en application/rar CRC Press |
institution |
Thư viện Trường Đại học Đà Lạt |
collection |
Thư viện số |
language |
English |
description |
The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker. This wide scope benefits anyone who has to administer, secure, hack, or conduct business on a wireless network.
This text tackles wireless risk from many angles. It discusses the mitigation of wireless risk at the policy level, cost-effective ways of deploying wireless across large enterprises, and financial controls that reduce unforeseen risks in wireless projects. The handbook also offers the technical details of how you can design, build, and hack nearly all wireless security components.
This volume also helps advance your career by covering all of the objectives of the three widely recognized wireless certifications--those administered by Planet3 Wireless and Cisco Systems. The book focuses on the wireless local area networking technologies that help you meet these objectives, while also analyzing almost all other facets of mobile communications. |
format |
Book |
author |
Earle, Aaron |
spellingShingle |
Earle, Aaron Wireless Security Handbook |
author_facet |
Earle, Aaron |
author_sort |
Earle, Aaron |
title |
Wireless Security Handbook |
title_short |
Wireless Security Handbook |
title_full |
Wireless Security Handbook |
title_fullStr |
Wireless Security Handbook |
title_full_unstemmed |
Wireless Security Handbook |
title_sort |
wireless security handbook |
publisher |
CRC Press |
publishDate |
2009 |
url |
http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1438 |
_version_ |
1757653596358311936 |