Earle | Wireless Security Handbook | E-Book | www.sack.de
E-Book

E-Book, Englisch, 384 Seiten

Earle Wireless Security Handbook


1. Auflage 2010
ISBN: 978-1-4200-3118-8
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

E-Book, Englisch, 384 Seiten

ISBN: 978-1-4200-3118-8
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker. This wide scope benefits anyone who has to administer, secure, hack, or conduct business on a wireless network.

This text tackles wireless risk from many angles. It discusses the mitigation of wireless risk at the policy level, cost-effective ways of deploying wireless across large enterprises, and financial controls that reduce unforeseen risks in wireless projects. The handbook also offers the technical details of how you can design, build, and hack nearly all wireless security components.

This volume also helps advance your career by covering all of the objectives of the three widely recognized wireless certifications--those administered by Planet3 Wireless and Cisco Systems. The book focuses on the wireless local area networking technologies that help you meet these objectives, while also analyzing almost all other facets of mobile communications.

Earle Wireless Security Handbook jetzt bestellen!

Zielgruppe


Security professionals, candidates for Certified Wireless Network Administrator (CWNA), Certified Wireless Security Professional (CWSP), and CISCO wireless certifications


Autoren/Hrsg.


Weitere Infos & Material


Wireless Network Overview

RF Overview

Wireless Signal Propagation
Signal-to-Noise Ratio
Modulation

Wireless Groups

Risks and Threats of Wireless
Goals of Information Security
Analysis
Spoofing

Denial of Service
Malicious Code
Social Engineering
Rogue Access Points
Cell Phone Security
Wireless Hacking and Hackers

RFID

The Legality of Computer Crime

Electronic Communications Privacy Act

Computer Fraud and Abuse Act
State Computer Crime Issues

Wireless Physical Layer Technologies
ISM Spectrum
Frequency Hopping Spread Spectrum (FHSS)

Direct Sequence Spread Spectrum (DSSS)
Orthogonal Frequency Division Multiplexing (OFDM)

Wireless Management Frames
Beacon
Probe Request

Probe Response
Authentication
Association Request

Association Response
Disassociation and De-Authentication

CSMA/CA
Fragmentation

Distributed Coordination Function

Point Coordination Function

Interframe Spacing
Service Set Identifier (SSID)

Wireless Local and Personal Area Networks

Ad Hoc Mode

Infrastructure Mode

Bridging
Repeater
Mesh Wireless Networks
Local Area Networking Standards

Personal Area Network (PAN) 802.15

Wide Area Wireless Technologies
Cell Phone Technologies
GPS

802.16 Air Interface Standard

802.20 Standard

Wireless Antenna Theory

RF Antenna Overview
Fresnel Zone
Antenna Types
Connectors

The Wireless Deployment Process

Gather Requirements

Estimation
Make the Business Case
Site Survey
Design

Staging
Deployment and Installation
Certification
Audit

Wireless Access Points

Linksys Access Points

Cisco Access Points

Wireless End Devices

Laptops
Tablets

PDA Devices
Handheld Scanners

Smart Phones

Wi-Fi Phones

Wireless LAN Security

Wireless LAN Security History
Authentication
SSID

Wireless Security Basics

Equivalent Privacy Standard (WEP)

802.1x

Remote Authentication Dial-In User Service (RADIUS)
Extensible Authentication Protocol (EAP)

Wi-Fi Protected Access (WPA)

802.11i
Wi-Fi Protected Access (WPA2)

WLAN Authentication and Privacy Infrastructure (WAPI)

Rogue Access Points Detection

Breaking Wireless Security
The Hacking Process

Wireless Network Compromising Techniques
Access Point Compromising Techniques

Wireless Security Policy
Policy Overview
The Policy-Writing Process

Risk Assessment
Impact Analysis
Wireless Security Policy Areas

Wireless Security Architectures

Static WEP Wireless Architecture

VPN

Wireless VPN Architecture Overview
VPN Policy Aspect
Wireless Gateway Systems

802.1x

Comparing Wireless Security Architectures

Wireless Tools
Scanning Tools
Sniffing Tools

Hybrid Tools

Denial-of-Service Tools

Cracking Tools

Access Point Attacking Tools
Other Wireless Security Tools

Appendix A: Review Question Answers



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.