Hurley / Barken | How to Cheat at Securing a Wireless Network | E-Book | www.sack.de
E-Book

E-Book, Englisch, 500 Seiten, Web PDF

Hurley / Barken How to Cheat at Securing a Wireless Network


1. Auflage 2006
ISBN: 978-0-08-050822-1
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark

E-Book, Englisch, 500 Seiten, Web PDF

ISBN: 978-0-08-050822-1
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark



Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless network

With the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006.

With this increase in usage comes a commensurate increase in the network's vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users.

? A practical product and technology specific guideline to securing a wireless networks for the busy System Administrator
? Takes a simplified multi-layered approach into easily deployed plans for a straight forward understanding
? Does not bog you down with history, but offers practical useful information for today

Hurley / Barken How to Cheat at Securing a Wireless Network jetzt bestellen!

Zielgruppe


Academic/professional/technical: Research and professional


Autoren/Hrsg.


Weitere Infos & Material


1;Front Cover;1
2;Securing a Wireless Network;4
3;Contents;14
4;Chapter 1. Introduction to Wireless: From Past to Present;28
4.1;Introduction;29
4.2;Exploring Past Discoveries That Led to Wireless;30
4.3;Exploring Present Applications for Wireless;37
4.4;Exploring This Book on Wireless;42
4.5;Summary;44
4.6;Solutions Fast Track;44
4.7;Frequently Asked Questions;45
5;Chapter 2. Wireless Security;46
5.1;Introduction;47
5.2;Enabling Security Features on a Linksys WRT54G 802.11g Access Point;47
5.3;Enabling Security Features on a D-Link DI-624 AirPlus 2.4 GHz Xtreme G Wireless Router with Four-Port Switch;55
5.4;Enable Wi-Fi Protected Access;60
5.5;Enabling Security Features on Apple's Airport Extreme 802.11g Access Point;63
5.6;Enabling Security Features on a Cisco 1100 Series Access Point;71
5.7;Enabling Security Features on Wireless Clients;83
5.8;Understanding and Configuring 802.1X RADIUS Authentication;101
5.9;Summary;124
5.10;Solutions Fast Track;124
5.11;Frequently Asked Questions;127
6;Chapter 3. Dangers of Wireless Devices in the Workplace;128
6.1;Introduction;129
6.2;Intruders Accessing Legitimate Access Points;129
6.3;Intruders Connecting to Rogue Wireless Access Points;135
6.4;Intruders Connecting to WLAN Cards;138
6.5;Summary;142
6.6;Solutions Fast Track;142
6.7;Frequently Asked Questions ;144
7;Chapter 4. WLAN Rogue Access Point Detection and Mitigation;146
7.1;Introduction;147
7.2;The Problem with Rogue Access Points;147
7.3;Preventing and Detecting Rogue Access Points;151
7.4;IEEE 802.1x Port-based Security to Prevent Rogue Access Points;158
7.5;Using Catalyst Switch Filters to Limit MAC Addresses per Port;167
7.6;Summary;173
7.7;Solutions Fast Track;174
7.8;Frequently Asked Questions;176
8;Chapter 5. Wireless LAN VLANs;178
8.1;Introduction;179
8.2;Understanding VLANs;180
8.3;VLANs in a Wireless Environment;186
8.4;Wireless VLAN Deployment;189
8.5;Configuring Wireless VLANs Using the IOS: A Case Study;192
8.6;Broadcast Domain Segmentation;198
8.7;Primary (Guest) and Secondary SSIDs;201
8.8;Using RADIUS for VLAN Access Control;202
8.9;Summary;205
8.10;Solutions Fast Track;206
8.11;Frequently Asked Questions;208
9;Chapter 6. Designing a Wireless Network;210
9.1;Introduction;211
9.2;Exploring the Design Process;211
9.3;Identifying the design methodology;216
9.4;Understanding Wireless Network Attributes from a Design Perspective;233
9.5;Summary;242
9.6;Solutions Fast Track ;242
9.7;Frequently Asked Questions;244
10;Chapter 7. Wireless Network Architecture and Design;246
10.1;Fixed Wireless Technologies;247
10.2;Developing WLANs through the 802.11 Architecture;260
10.3;Developing WPANs through the 802.15 Architecture;269
10.4;Mobile Wireless Technologies;273
10.5;Optical Wireless Technologies;279
10.6;Summary;280
10.7;Solutions Fast Track;282
10.8;Frequently Asked Questions;285
11;Chapter 8. Monitoring and Intrusion Detection;288
11.1;Introduction;289
11.2;Designing for Detection;289
11.3;Defensive Monitoring Considerations;292
11.4;Intrusion Detection Strategies;299
11.5;Conducting Vulnerability Assessments;306
11.6;Incident Response and Handling;309
11.7;Conducting Site Surveys for Rogue Access Points;313
11.8;Summary;318
11.9;Solutions Fast Track;319
11.10;Frequently Asked Questions;321
12;Chapter 9. Designing a Wireless Enterprise Network: Hospital Case Study;324
12.1;Introduction;325
12.2;Introducing the Enterprise Case Study;326
12.3;Designing a Wireless Solution;331
12.4;Implementing and Testing the Wireless Solution;337
12.5;Lessons Learned;341
12.6;Summary;342
12.7;Solutions Fast Track;343
12.8;Frequently Asked Questions ;344
13;Chapter 10. Designing a Wireless Industrial Network: Retail Case Study;346
13.1;Introduction;347
13.2;Introducing the Industrial Case Study;348
13.3;Designing and Implementing the Wireless Network;351
13.4;Planning the Equipment Placement;361
13.5;Lessons Learned;371
13.6;Summary;372
13.7;Solutions Fast Track;373
13.8;Frequently Asked Questions;374
14;Chapter 11. Designing a Wireless Home Network: Home Office Case Study;376
14.1;Introduction;377
14.2;Introducing the Wireless Home Network Case Study;379
14.3;Designing the Wireless Home Network;380
14.4;Implementing the Wireless Home Network;392
14.5;Designing a Wireless Home Network for Data, Voice, and Beyond;399
14.6;Lessons Learned;403
14.7;Summary;404
14.8;Solutions Fast Track;404
14.9;Frequently Asked Questions;406
15;Chapter 12. Wireless Penetration Testing;408
15.1;Introduction;409
15.2;Approach;410
15.3;Core Technologies;412
15.4;Open Source Tools;420
15.5;Case Studies;435
15.6;Further Information;441
16;Appendix A: Solutions Fast Track;444
17;Index;468



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.