Item type | Current library | Home library | Shelving location | Call number | Materials specified | Status | Barcode | |
---|---|---|---|---|---|---|---|---|
![]() |
American University in Dubai | American University in Dubai | Main Collection | QA 76.9 .A25 B3775 2004 (Browse shelf(Opens below)) | Copy Type:01 - Books | Available | 645614 |
Includes index.
The Need for Wireless LAN Security -- Security in Layers -- Size Matters--What Are You Protecting? -- Wireless LAN 101 -- Service Set Identifier (SSID) Broadcasts -- MAC Filtering -- Wired Equivalent Privacy (WEP) -- Shared Key Authentication -- Wi-Fi Protected Access (WPA) -- Beware: The Walls are Listening... -- Stop the RF Bleeding -- Introduction to WLAN -- Pre-802.11 -- 802.11 (1997) -- Spread Spectrum -- FHSS -- DSSS -- 801.11b -- Interoperability -- Critical Mass -- 802.11a -- 802.11g -- Other Working Groups -- 802.11 Specification -- A Tale of Two Topologies -- IBSS, a.k.a. Ad-Hoc Mode -- BSS/ESS, a.k.a. Infrastructure Mode -- CSMA/CA -- RTS/CTS -- Fragmentation -- WEP Vulnerabilities--Wired Equivalent Privacy? -- WEP 101 -- Decrypting the WEP Message -- Where Do IVs Come From? -- XOR Explained -- Key Management Problems -- RC4 Stream Cipher -- IV Collisions -- Message Injection -- Authentication Spoofing -- Brute Force Attacks -- Cracking WEP Keys -- Brute Force Attacks vs. FMS Attacks -- Effective FMS Attacks -- Now What? -- War Driving: Tools and Techniques -- What Is War Driving? -- War Driving: How Does it Work? -- Finding the AP -- Getting the Right Gear -- Hardware Options -- Software Options -- Wireless Sniffers -- Putting It All Together -- Ethical Considerations -- War Chalking -- 802.11i, WPA, TKIP, and AES -- WPA to the Rescue! -- TKIP -- Per-Packet Key Mixing -- Michael: TKIP's MIC Function -- A Larger IV Space -- WPA for the Home -- WPA's Future -- 802.11i and AES -- Introducing a New Cipher, AES-CCMP -- A New MIC -- A New Encryption Engine -- 802.1x Explained -- Where Did 802.1x Come From? -- Enter EAP -- 802.1x Framework -- Guilty Until Proven Innocent (or Authenticated) -- 802.1x Authentication Conversation -- Solving Security Problems with 802.1x -- But Wait, There's More! -- EAP Authentication Methods -- MD5 -- LEAP -- TLS -- TTLS -- PEAP -- Competing Standards -- Connecting a WLAN to the Wired Network -- Assessing the Information Assets -- A Layered Approach -- Multiple SSIDs -- 802.1x vs. VPN -- How to Deploy a VPN for Wireless Environments -- PPTP vs. L2TP/IPSee -- PPTP: Point-to-Point Tunneling Protocol -- L2TP: Layer 2 Tunneling Protocol with IPSee -- Choosing an Authentication Protocol -- Building a VPN Server -- Configuring the VPN Server -- Manually Configured Server -- Configuring Static Routes -- Increase PPTP and L2TP Ports -- Create VPN Filters -- Assign a Phone Number -- Establishing VPN policies -- Configuring Clients -- The Downside to VPNs -- How to Secure and Manage a Home Environment -- Basic Security Steps -- Beyond Security: Managing the Network -- AP on Steroids? -- Linux Embedded Appliance Firewall (LEAF) -- Real-World Strategy and Example -- Now What? -- Adding Wireless Client Support to Bering -- Orinoco Cards -- Prism Cards -- Fun with Bering -- Sputnik Around the World -- ReefEdge Dolphin -- How to Secure an Enterprise Environment -- 802.1x Revisited -- Setting Up the Authentication Server -- Configuring the CA -- Configuring the Authenticator -- Setting Up the Supplicant -- All Systems Go -- Using EAP-TLS with Windows 2000 Server -- Setting up a Secure Public Hotspot: Building a Linux-Based Access Point -- HostAP Prism Driver for Linux -- NoCat -- The 800-Pound Pebble -- More Embedded Systems -- Hardware Options -- LEAF to the Rescue -- Don't Forget the Backups! -- Troubleshooting Tips -- Introduction to RF -- The History of Radio Frequency -- Electromagnetism -- Induction -- Conduction -- Radio Waves -- Structure of a Wave -- Modulation -- Amplitude Modulation -- Frequency Modulation -- Digital Modulation -- Frequency-Shift Keying (FSK) -- Attenuation -- Antennae -- How Antennae Work -- Different Kinds of Antennae -- Antenna Types -- Isotropic Antennae -- Omnidirectional Antennae -- Patch, Panel, and Sector Antennae -- Parabolic Grid Antennae -- Yagi Antennae -- Pringles Can Antennae -- Vivato -- 802.11 Frame Types -- Management Frames -- Control Frames -- Data Frames -- Community Wireless Networking -- For Pay -- Amenity -- Utility -- User Groups -- The Mission -- The Legal Issues -- Sentre Partners in San Diego -- Software Options for Free Hotspots -- The Big Picture -- Building a Pringles Can Antenna -- Shopping List -- Tools You'll Need.
Now you can have the awesome benefits of wireless LANs without falling victim to their notorious security flaws. Leading wireless security expert Lee Barken shows you practical workarounds and fixes for the vulnerabilities in today's WLANs, introduces high-security wireless protocols new to the marketplace, and offers step-by-step instructions for protecting all your wireless information, from the home to the enterprise. This is the definitive and easy-to-use WLAN security book you've been searching for-whether you're a network administrator, security specialist, manager, or home user.
There are no comments on this title.