Hugendubel.de - Das Lesen ist schön

Warenkorb

€ 0,00 0 Buch dabei,
portofrei
50% und mehr sparen mit den eBook Schnäppchen der Woche >>
Hackproofing Your Wireless Network als Taschenbuch
PORTO-
FREI

Hackproofing Your Wireless Network

von Syngress
Sprache: Englisch.
Taschenbuch
The only way to stop a hacker is to think like one! Wireless technology is a new and rapidly growing field of concentration for network engineers and administrators. Innovative technology is now making the communication between computers a cordless ... weiterlesen
Dieses Taschenbuch ist auch verfügbar als:
Taschenbuch

51,49*

inkl. MwSt.
Portofrei
Lieferbar innerhalb von zwei Wochen
Hackproofing Your Wireless Network als Taschenbuch
Produktdetails
Titel: Hackproofing Your Wireless Network
Autor/en: Syngress

ISBN: 1928994598
EAN: 9781928994596
Sprache: Englisch.
SYNGRESS MEDIA

Mai 2002 - kartoniert - 608 Seiten

Beschreibung

The only way to stop a hacker is to think like one! Wireless technology is a new and rapidly growing field of concentration for network engineers and administrators. Innovative technology is now making the communication between computers a cordless affair. Wireless devices and networks are vulnerable to additional security risks because of their presence in the mobile environment. Hack Proofing Your Wireless Network is the only book written specifically for architects, engineers, and administrators responsible for securing their wireless networks. From making sense of the various acronyms (WAP, WEP, SSL, PKE, PKI, SSL, SSH, IPSEC) to the implementation of security policies, plans, and recovery protocols, this book will help users secure their wireless network before its security is compromised. The only way to stop a hacker is to think like one...this book details the multiple ways a hacker can attack a wireless network - and then provides users with the knowledge they need to prevent said attacks. Uses forensic-based analysis to give the reader an insight into the mind of a hacker With the growth of wireless networks architects, engineers and administrators will need this book Up to the minute Web based support at www.solutions@syngress.com

Inhaltsverzeichnis

Foreword

Chapter 1 The Wireless Challenge

Introduction

Wireless Technology Overview

Defining Cellular-based Wireless

Defining the Wireless LAN

The Convergence of Wireless Technologies

Trends and Statistics

Understanding the Promise of Wireless

Wireless Networking

Understanding the Benefits of Wireless

Convenience

Affordability

Speed

Aesthetics

Productivity

Facing the Reality of Wireless Today

Standards Conflicts

Commercial Conflicts

Market Adoption Challenges

The Limitations of "Radio

The Limitations of Wireless Security

Examining the Wireless Standards

Cellular-based Wireless Networks

Wireless LAN Networks

Understanding Public Key Infrastructures and Wireless Networking

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 2 A Security Primer

Introduction

Understanding Security Fundamentals and Principles of Protection

Ensuring Confidentiality

Ensuring Integrity

Ensuring Availability

Ensuring Privacy

Ensuring Authentication

Ensuring Authorization

Ensuring Non-repudiation

Accounting and Audit Trails

Using Encryption

Reviewing the Role of Policy

Identifying Resources

Understanding Classification Criteria

Implementing Policy

Recognizing Accepted Security and Privacy Standards

Reviewing Security Standards

Reviewing Privacy Standards and Regulations

Addressing Common Risks and Threats

Experiencing Loss of Data

Experiencing Denial and Disruption of Service

Eavesdropping

Preempting the Consequences of an Organization's Loss

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 3 Wireless Network

Architecture and Design

Introduction

Fixed Wireless Technologies

Multichannel Multipoint Distribution Service

Local Multipoint Distribution Services

Wireless Local Loop

Point-to-Point Microwave

Wireless Local Area Networks

Why the Need for a Wireless LAN Standard?

Developing WLANs through the 802.11 Architecture

The Basic Service Set

The Extended Service Set

The CSMA-CA Mechanism

Configuring Fragmentation

Using Power Management Options

Multicell Roaming

Security in the WLAN

Developing WPANs through the 802.15 Architecture

Bluetooth

HomeRF

High Performance Radio LAN

Mobile Wireless Technologies

First Generation Technologies

Second Generation Technologies

2.5G Technology

Third Generation Technologies

Wireless Application Protocol

Global System for Mobile Communications

General Packet Radio Service

Short Message Service

Optical Wireless Technologies

Exploring the Design Process

Conducting the Preliminary Investigation

Performing Analysis of the Existing Environment

Creating a Preliminary Design

Finalizing the Detailed Design

Executing the Implementation

Capturing the Documentation

Creating the Design Methodology

Creating the Network Plan

Developing the Network Architecture

Reviewing and Validating the Planning Phase

Creating a High-Level Topology

Creating a Collocation Architecture

Defining the High-Level Services

Formalizing the Detailed Design Phase

Understanding Wireless Network Attributes from a Design Perspective

Application Support

Physical Landscape

Network Topology

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 4 Common Attacks and Vulnerabilities

Introduction

The Weaknesses in WEP

Criticisms of the Overall Design

Weaknesses in the Encryption Algorithm

Weaknesses in Key Management

Weaknesses in User Behavior

Conducting Reconnaissance

Finding a Target

Finding Weaknesses in a Target

Exploiting Those Weaknesses

Sniffing, Interception, and Eavesdropping

Defining Sniffing

Sample Sniffing Tools

Sniffing Case Scenario

Protecting Against Sniffing and Eavesdropping

Spoofing and Unauthorized Access

Defining Spoofing

Sample Spoofing T
Servicehotline
089 - 70 80 99 47

Mo. - Fr. 8.00 - 20.00 Uhr
Sa. 10.00 - 20.00 Uhr
Filialhotline
089 - 30 75 75 75

Mo. - Sa. 9.00 - 20.00 Uhr
Bleiben Sie in Kontakt:
Sicher & bequem bezahlen:
akzeptierte Zahlungsarten: Überweisung, offene Rechnung,
Visa, Master Card, American Express, Paypal
Zustellung durch:
* Alle Preise verstehen sich inkl. der gesetzlichen MwSt. Informationen über den Versand und anfallende Versandkosten finden Sie hier.
** im Vergleich zum dargestellten Vergleichspreis.