Cargando…

How to Cheat at Securing a Wireless Network.

Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless networkWith the inc...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Hurley, Chris
Otros Autores: Barken, Lee
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland : Elsevier Science, 2006.
Colección:"How to cheat--"
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 EBOOKCENTRAL_ocn935261561
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 160123s2006 xx of 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCO  |d OCLCQ  |d MERUC  |d ZCU  |d S8J  |d OCLCO  |d OCLCF  |d OCLCQ  |d OCLCO  |d ICG  |d OCLCQ  |d DKC  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 935246573 
020 |a 9780080508221 
020 |a 0080508227 
029 1 |a AU@  |b 000060080911 
029 1 |a DEBBG  |b BV044121346 
035 |a (OCoLC)935261561  |z (OCoLC)935246573 
050 4 |a TK5103.2 ǂb H68 2006eb 
082 0 4 |a 621.3845 
049 |a UAMI 
100 1 |a Hurley, Chris. 
245 1 0 |a How to Cheat at Securing a Wireless Network. 
260 |a Rockland :  |b Elsevier Science,  |c 2006. 
300 |a 1 online resource (481 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a How to Cheat 
588 0 |a Print version record. 
505 0 |a Front Cover; Securing a Wireless Network; Contents; Chapter 1. Introduction to Wireless: From Past to Present; Introduction; Exploring Past Discoveries That Led to Wireless; Exploring Present Applications for Wireless; Exploring This Book on Wireless; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Wireless Security; Introduction; Enabling Security Features on a Linksys WRT54G 802.11g Access Point; Enabling Security Features on a D-Link DI-624 AirPlus 2.4 GHz Xtreme G Wireless Router with Four-Port Switch; Enable Wi-Fi Protected Access. 
505 8 |a Enabling Security Features on Apple's Airport Extreme 802.11g Access PointEnabling Security Features on a Cisco 1100 Series Access Point; Enabling Security Features on Wireless Clients; Understanding and Configuring 802.1X RADIUS Authentication; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Dangers of Wireless Devices in the Workplace; Introduction; Intruders Accessing Legitimate Access Points; Intruders Connecting to Rogue Wireless Access Points; Intruders Connecting to WLAN Cards; Summary; Solutions Fast Track; Frequently Asked Questions. 
505 8 |a Chapter 4. WLAN Rogue Access Point Detection and MitigationIntroduction; The Problem with Rogue Access Points; Preventing and Detecting Rogue Access Points; IEEE 802.1x Port-based Security to Prevent Rogue Access Points; Using Catalyst Switch Filters to Limit MAC Addresses per Port; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Wireless LAN VLANs; Introduction; Understanding VLANs; VLANs in a Wireless Environment; Wireless VLAN Deployment; Configuring Wireless VLANs Using the IOS: A Case Study; Broadcast Domain Segmentation; Primary (Guest) and Secondary SSIDs. 
505 8 |a Using RADIUS for VLAN Access ControlSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Designing a Wireless Network; Introduction; Exploring the Design Process; Identifying the design methodology; Understanding Wireless Network Attributes from a Design Perspective; Summary; Solutions Fast Track ; Frequently Asked Questions; Chapter 7. Wireless Network Architecture and Design; Fixed Wireless Technologies; Developing WLANs through the 802.11 Architecture; Developing WPANs through the 802.15 Architecture; Mobile Wireless Technologies; Optical Wireless Technologies; Summary. 
505 8 |a Solutions Fast TrackFrequently Asked Questions; Chapter 8. Monitoring and Intrusion Detection; Introduction; Designing for Detection; Defensive Monitoring Considerations; Intrusion Detection Strategies; Conducting Vulnerability Assessments; Incident Response and Handling; Conducting Site Surveys for Rogue Access Points; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Designing a Wireless Enterprise Network: Hospital Case Study; Introduction; Introducing the Enterprise Case Study; Designing a Wireless Solution; Implementing and Testing the Wireless Solution. 
500 |a Lessons Learned. 
520 |a Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless networkWith the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the network's vulnerability to. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer networks  |x Security measures  |v Handbooks, manuals, etc. 
650 0 |a Wireless communication systems  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |v Guides, manuels, etc. 
650 6 |a Transmission sans fil  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Wireless communication systems  |x Security measures  |2 fast 
655 7 |a Handbooks and manuals  |2 fast 
700 1 |a Barken, Lee. 
758 |i has work:  |a How to cheat at securing a wireless network (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFrrtDfW47QHwrWK6g3Hhb  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Hurley, Chris.  |t How to Cheat at Securing a Wireless Network.  |d Rockland : Elsevier Science, ©2006  |z 9781597490870 
830 0 |a "How to cheat--" 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=274288  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL274288 
994 |a 92  |b IZTAP