Hackproofing Your Wireless Network

1st Edition

Authors: Syngress
Paperback ISBN: 9781928994596
eBook ISBN: 9780080478180
Imprint: Syngress
Published Date: 22nd March 2002
Page Count: 608
39.95 + applicable tax
31.99 + applicable tax
51.95 + applicable tax
Unavailable
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


Description

The only way to stop a hacker is to think like one! Wireless technology is a new and rapidly growing field of concentration for network engineers and administrators. Innovative technology is now making the communication between computers a cordless affair. Wireless devices and networks are vulnerable to additional security risks because of their presence in the mobile environment. Hack Proofing Your Wireless Network is the only book written specifically for architects, engineers, and administrators responsible for securing their wireless networks. From making sense of the various acronyms (WAP, WEP, SSL, PKE, PKI, SSL, SSH, IPSEC) to the implementation of security policies, plans, and recovery protocols, this book will help users secure their wireless network before its security is compromised. The only way to stop a hacker is to think like one...this book details the multiple ways a hacker can attack a wireless network - and then provides users with the knowledge they need to prevent said attacks.

Key Features

Uses forensic-based analysis to give the reader an insight into the mind of a hacker With the growth of wireless networks architects, engineers and administrators will need this book Up to the minute Web based support at www.solutions@syngress.com

Table of Contents

Foreword Chapter 1 The Wireless Challenge Introduction Wireless Technology Overview Defining Cellular-based Wireless Defining the Wireless LAN The Convergence of Wireless Technologies Trends and Statistics Understanding the Promise of Wireless Wireless Networking Understanding the Benefits of Wireless Convenience Affordability Speed Aesthetics Productivity Facing the Reality of Wireless Today Standards Conflicts Commercial Conflicts Market Adoption Challenges The Limitations of “Radio” The Limitations of Wireless Security Examining the Wireless Standards Cellular-based Wireless Networks Wireless LAN Networks Understanding Public Key Infrastructures and Wireless Networking Summary Solutions Fast Track Frequently Asked Questions Chapter 2 A Security Primer Introduction Understanding Security Fundamentals and Principles of Protection Ensuring Confidentiality Ensuring Integrity Ensuring Availability Ensuring Privacy Ensuring Authentication Ensuring Authorization Ensuring Non-repudiation Accounting and Audit Trails Using Encryption Reviewing the Role of Policy Identifying Resources Understanding Classification Criteria Implementing Policy Recognizing Accepted Security and Privacy Standards Reviewing Security Standards Reviewing Privacy Standards and Regulations Addressing Common Risks and Threats Experiencing Loss of Data Experiencing Denial and Disruption of Service Eavesdropping Preempting the Consequences of an Organization’s Loss Summary Solutions Fast Track Frequently Asked Q

Details

No. of pages:
608
Language:
English
Copyright:
© Syngress 2002
Published:
Imprint:
Syngress
eBook ISBN:
9780080478180
Paperback ISBN:
9781928994596

About the Author

Reviews

The only way to stop a hacker is to think like one! Wireless technology is a new and rapidly growing field of concentration for network engineers and administrators. Innovative technology is now making the communication between computers a cordless affair. Wireless devices and networks are vulnerable to additional security risks because of their presence in the mobile environment. Hack Proofing Your Wireless Network is the only book written specifically for architects, engineers, and administrators responsible for securing their wireless networks. From making sense of the various acronyms (WAP, WEP, SSL, PKE, PKI, SSL, SSH, IPSEC) to the implementation of security policies, plans, and recovery protocols, this book will help users secure their wireless network before its security is compromised. The only way to stop a hacker is to think like one...this book details the multiple ways a hacker can attack a wireless network - and then provides users with the knowledge they need to prevent said attacks.