How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN
Lee Barken
- 出版商: Prentice Hall
- 出版日期: 2003-09-05
- 售價: $1,500
- 貴賓價: 9.5 折 $1,425
- 語言: 英文
- 頁數: 224
- 裝訂: Paperback
- ISBN: 0131402064
- ISBN-13: 9780131402065
-
相關分類:
Wi-Fi
已絕版
買這商品的人也買了...
-
$680$537 -
$350$277 -
$580$458 -
$880$695 -
$800$632 -
$780$741 -
$450$383 -
$650$553 -
$760$600 -
$680$537 -
$980$960 -
$560$442 -
$750$675 -
$299$254 -
$299$254 -
$299$254 -
$299$254 -
$1,176Computer Organization and Design: The Hardware/Software Interface, 3/e(IE) (美國版ISBN:1558606041)
-
$1,250$1,225 -
$1,127Interactive Computer Graphics: A Top-Down Approach using OpenGL, 4/e (美國版ISBN:0321321375 )
-
$750$593 -
$680$646 -
$400$360 -
$780$741 -
$400$340
相關主題
商品描述
Now you can have the awesome benefits of wireless LANswithout falling victim to their notorious security flaws. Leadingwireless security expert Lee Barken shows you practicalworkarounds and fixes for the vulnerabilities in today'sWLANs, introduces high-security wireless protocols new to themarketplace, and offers step-by-step instructions for protectingall your wireless information, from the home to the enterprise.This is the definitive and easy-to-use WLAN security book you'vebeen searching for--whether you're a network administrator,security specialist, manager, or home user.
Topics covered include--
- Why conventional wireless LANs are so insecure--and what you can do about it
- "Wardriving" software, equipment, and techniques: knowing your enemy
- 802.11i, WPA, TKIP, and AES: the new wireless security options
- 802.1x and EAP: enabling port-based authentication on your WLAN
- Safely connecting WLANs to wired networks
- Securing home and small office environments, one step at a time
- Accessing VPNs from wireless devices
- Integrating firewalls and wireless access points
- Improving security in public access environments
- Securing enterprise environments with 802.1x--a start-to-finish walkthrough
Table of Contents
Foreword.
Introduction.
1. The Need
For Wireless LAN Security.
2. Introduction to WLAN.
3. WEP Vulnerabilities—Wired Equivalent Privacy?
4. War Driving: Tools And Techniques.
5. 802.11I, WPA, TKIP, AND AES.
6. 802.1X Explained.
7. Connecting a WLAN to the Wired Network.
8. How to Deploy A VPN for Wireless Environments.
9. How to Secure and Manage a Home Environment.
10. How to Secure an Enterprise Environment.
11. Setting Up a Secure Public Hotspot: Building A Linux-Based
Access Point.
Appendix A: Introduction to RF.
Appendix B: 802.11 Frame Types.
Appendix C: Community Wireless Networking for Pay.
Appendix D: Building a Pringles Can Antenna.
Index.