Save 40% on books and eBooks + 70% on videos now through May 31*—use code PROGRAM. Shop now.
Now you can have the awesome benefits of wireless LANswithout falling victim to their notorious security flaws. Leadingwireless security expert Lee Barken shows you practicalworkarounds and fixes for the vulnerabilities in today'sWLANs, introduces high-security wireless protocols new to themarketplace, and offers step-by-step instructions for protectingall your wireless information, from the home to the enterprise.This is the definitive and easy-to-use WLAN security book you'vebeen searching for--whether you're a network administrator,security specialist, manager, or home user.Topics covered include--
Download the Sample Chapter related to this title.
(NOTE: Each chapter begins with an Introduction and concludes with a Summary.)
1. The Need For Wireless LAN Security.
Security in Layers. Size Matters—What Are You Protecting? Wireless LAN 101. Shared Key Authentication. Wi-Fi Protected Access (WPA). Beware: The Walls are Listening… Stop the RF Bleeding.
Pre-802.11. 802.11 (1997). Spread Spectrum. 801.11b. Interoperability. Critical Mass. 802.11a. 802.11g. Other Working Groups. 802.11 Specification. A Tale of Two Topologies. CSMA/CA. RTS/CTS. Fragmentation.
WEP 101. Decrypting the WEP Message. Key Management Problems. RC4 Stream Cipher. IV Collisions. Message Injection. Authentication Spoofing. Brute Force Attacks. Cracking WEP Keys. Now What?
What Is War Driving? Wireless Sniffers. Putting It All Together. Ethical Considerations. War Chalking.
WPA to the Rescue! TKIP. WPA for the Home. 802.11i and AES.
Where Did 802.1x Come From? Guilty Until Proven Innocent (or Authenticated). 802.1x Authentication Conversation. Solving Security Problems with 802.1x. But Wait, There's More! Competing Standards.
Assessing the Information Assets. A Layered Approach. Multiple SSIDs. 802.1x vs. VPN. Hands-on Projects.
PPTP vs. L2TP/IPSec. PPTP: Point-to-Point Tunneling Protocol. L2TP: Layer 2 Tunneling Protocol with IPSec. Choosing an Authentication Protocol. Building a VPN Server. Configuring the VPN Server. Configuring Clients. The Downside to VPNs.
Basic Security Steps. Beyond Security: Managing the Network. AP on Steroids? Linux Embedded Appliance Firewall (LEAF). Adding Wireless Client Support to Bering. Sputnik around the World. ReefEdge Dolphin.
802.1x Revisited. Setting Up the Authentication Server. Configuring the CA. Configuring the Authenticator. Using EAP-TLS with Windows 2000 Server.
HostAP Prism Driver for Linux. NoCat. The 800-Pound Pebble. LEAF to the Rescue. Troubleshooting Tips.
The History of Radio Frequency. Electromagnetism. Induction. Conduction. Radio Waves. Structure of a Wave. Modulation. Attenuation. Antennae. How Antennae Work. Different Kinds of Antennae. Antenna Types. Summary.
Management Frames. Control Frames. Data Frames.
For Pay. Amenity. Utility. User Groups. The Mission. The Legal Issues. Sentre Partners in San Diego. Software Options for Free Hotspots. The Big Picture.
Download the Index
file related to this title.