How to Cheat at Securing a Wireless NetworkBy
- Chris Hurley, Chris Hurley is a Senior Penetration Tester in the Washington, DC area. He has more than 10 years of experience performing penetration testing, vulnerability assessments, and general INFOSEC grunt work. He is the founder of the WorldWide WarDrive, a four-year project to assess the security posture of wireless networks deployed throughout the world. Chris was also the original organizer of the DEF CON WarDriving contest. He is the lead author of WarDriving: Drive, Detect, Defend (Syngress Publishing, ISBN: 19318360305). He has contributed to several other Syngress publications, including Penetration Tester's Open Source Toolkit (ISBN: 1-5974490210), Stealing the Network: How to Own an Identity (ISBN: 1597490067), InfoSec Career Hacking (ISBN: 1597490113), and OS X for Hackers at Heart (ISBN: 1597490407). He has a BS from Angelo State University in Computer Science and a whole bunch of certifications to make himself feel important.
- Lee Barken, co-director of the Strategic Technologies And Research (STAR) Center, San Diego State University, U.S.A.
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless networkWith the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the networks vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users.
Network administrator and Security administrators who need to secure wireless networks.
Paperback, 500 Pages
Published: August 2006
- 1: Introduction to Wireless: From Past to Present2: Wireless Security3: Dangers of Wireless Devices in the Workplace4: WLAN Rogue Access Point Detection and Mitigation5: Wireless LAN VLANs6: Wireless Network Architecture and Design7: Wireless Network Architecture and Design8: Monitoring and Intrusion Detection9: Case Study: Designing a Wireless Enterprise Network10: Case Study: Designing a Wireless Industrial Network11: Designing a Personal Wireless Network: Home Office Case Study12: Wireless Penetration Testing13:Appendix A: Solutions Fast Track