|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_ocn935261561 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
160123s2006 xx of 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCO
|d OCLCQ
|d MERUC
|d ZCU
|d S8J
|d OCLCO
|d OCLCF
|d OCLCQ
|d OCLCO
|d ICG
|d OCLCQ
|d DKC
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 935246573
|
020 |
|
|
|a 9780080508221
|
020 |
|
|
|a 0080508227
|
029 |
1 |
|
|a AU@
|b 000060080911
|
029 |
1 |
|
|a DEBBG
|b BV044121346
|
035 |
|
|
|a (OCoLC)935261561
|z (OCoLC)935246573
|
050 |
|
4 |
|a TK5103.2 ǂb H68 2006eb
|
082 |
0 |
4 |
|a 621.3845
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Hurley, Chris.
|
245 |
1 |
0 |
|a How to Cheat at Securing a Wireless Network.
|
260 |
|
|
|a Rockland :
|b Elsevier Science,
|c 2006.
|
300 |
|
|
|a 1 online resource (481 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a How to Cheat
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Front Cover; Securing a Wireless Network; Contents; Chapter 1. Introduction to Wireless: From Past to Present; Introduction; Exploring Past Discoveries That Led to Wireless; Exploring Present Applications for Wireless; Exploring This Book on Wireless; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Wireless Security; Introduction; Enabling Security Features on a Linksys WRT54G 802.11g Access Point; Enabling Security Features on a D-Link DI-624 AirPlus 2.4 GHz Xtreme G Wireless Router with Four-Port Switch; Enable Wi-Fi Protected Access.
|
505 |
8 |
|
|a Enabling Security Features on Apple's Airport Extreme 802.11g Access PointEnabling Security Features on a Cisco 1100 Series Access Point; Enabling Security Features on Wireless Clients; Understanding and Configuring 802.1X RADIUS Authentication; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Dangers of Wireless Devices in the Workplace; Introduction; Intruders Accessing Legitimate Access Points; Intruders Connecting to Rogue Wireless Access Points; Intruders Connecting to WLAN Cards; Summary; Solutions Fast Track; Frequently Asked Questions.
|
505 |
8 |
|
|a Chapter 4. WLAN Rogue Access Point Detection and MitigationIntroduction; The Problem with Rogue Access Points; Preventing and Detecting Rogue Access Points; IEEE 802.1x Port-based Security to Prevent Rogue Access Points; Using Catalyst Switch Filters to Limit MAC Addresses per Port; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Wireless LAN VLANs; Introduction; Understanding VLANs; VLANs in a Wireless Environment; Wireless VLAN Deployment; Configuring Wireless VLANs Using the IOS: A Case Study; Broadcast Domain Segmentation; Primary (Guest) and Secondary SSIDs.
|
505 |
8 |
|
|a Using RADIUS for VLAN Access ControlSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Designing a Wireless Network; Introduction; Exploring the Design Process; Identifying the design methodology; Understanding Wireless Network Attributes from a Design Perspective; Summary; Solutions Fast Track ; Frequently Asked Questions; Chapter 7. Wireless Network Architecture and Design; Fixed Wireless Technologies; Developing WLANs through the 802.11 Architecture; Developing WPANs through the 802.15 Architecture; Mobile Wireless Technologies; Optical Wireless Technologies; Summary.
|
505 |
8 |
|
|a Solutions Fast TrackFrequently Asked Questions; Chapter 8. Monitoring and Intrusion Detection; Introduction; Designing for Detection; Defensive Monitoring Considerations; Intrusion Detection Strategies; Conducting Vulnerability Assessments; Incident Response and Handling; Conducting Site Surveys for Rogue Access Points; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Designing a Wireless Enterprise Network: Hospital Case Study; Introduction; Introducing the Enterprise Case Study; Designing a Wireless Solution; Implementing and Testing the Wireless Solution.
|
500 |
|
|
|a Lessons Learned.
|
520 |
|
|
|a Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless networkWith the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the network's vulnerability to.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer networks
|x Security measures
|v Handbooks, manuals, etc.
|
650 |
|
0 |
|a Wireless communication systems
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|v Guides, manuels, etc.
|
650 |
|
6 |
|a Transmission sans fil
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Wireless communication systems
|x Security measures
|2 fast
|
655 |
|
7 |
|a Handbooks and manuals
|2 fast
|
700 |
1 |
|
|a Barken, Lee.
|
758 |
|
|
|i has work:
|a How to cheat at securing a wireless network (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFrrtDfW47QHwrWK6g3Hhb
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Hurley, Chris.
|t How to Cheat at Securing a Wireless Network.
|d Rockland : Elsevier Science, ©2006
|z 9781597490870
|
830 |
|
0 |
|a "How to cheat--"
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=274288
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL274288
|
994 |
|
|
|a 92
|b IZTAP
|