The only way to stop a hacker is to think like one! Wireless technology is a new and rapidly growing field of concentration for network engineers and administrators. Innovative technology is now making the communication between computers a cordless affair. Wireless devices and networks are vulnerable to additional security risks because of their presence in the mobile environment. Hack Proofing Your Wireless Network is the only book written specifically for architects, engineers, and administrators responsible for securing their wireless networks. From making sense of the various acronyms (WAP, WEP, SSL, PKE, PKI, SSL, SSH, IPSEC) to the implementation of security policies, plans, and recovery protocols, this book will help users secure their wireless network before its security is compromised. The only way to stop a hacker is to think like one...this book details the multiple ways a hacker can attack a wireless network - and then provides users with the knowledge they need to prevent said attacks.

Key Features

Uses forensic-based analysis to give the reader an insight into the mind of a hacker With the growth of wireless networks architects, engineers and administrators will need this book Up to the minute Web based support at

Table of Contents

Foreword Chapter 1 The Wireless Challenge Introduction Wireless Technology Overview Defining Cellular-based Wireless Defining the Wireless LAN The Convergence of Wireless Technologies Trends and Statistics Understanding the Promise of Wireless Wireless Networking Understanding the Benefits of Wireless Convenience Affordability Speed Aesthetics Productivity Facing the Reality of Wireless Today Standards Conflicts Commercial Conflicts Market Adoption Challenges The Limitations of “Radio” The Limitations of Wireless Security Examining the Wireless Standards Cellular-based Wireless Networks Wireless LAN Networks Understanding Public Key Infrastructures and Wireless Networking Summary Solutions Fast Track Frequently Asked Questions Chapter 2 A Security Primer Introduction Understanding Security Fundamentals and Principles of Protection Ensuring Confidentiality Ensuring Integrity Ensuring Availability Ensuring Privacy Ensuring Authentication Ensuring Authorization Ensuring Non-repudiation Accounting and Audit Trails Using Encryption Reviewing the Role of Policy Identifying Resources Understanding Classification Criteria Implementing Policy Recognizing Accepted Security and Privacy Standards Reviewing Security Standards Reviewing Privacy Standards and Regulations Addressing Common Risks and Threats Experiencing Loss of Data Experiencing Denial and Disruption of Service Eavesdropping Preempting the Consequences of an Organization’s Loss Summary Solutions Fast Track Frequently Asked Q


No. of pages:
© 2002
Electronic ISBN:
Print ISBN:

About the author