€ 0,00 0 Buch dabei,
Hackproofing Your Wireless Network als Taschenbuch

Hackproofing Your Wireless Network

von Syngress
Sprache: Englisch.
The only way to stop a hacker is to think like one! Wireless technology is a new and rapidly growing field of concentration for network engineers and administrators. Innovative technology is now making the communication between computers a cordless … weiterlesen
Dieses Taschenbuch ist auch verfügbar als:


inkl. MwSt.
Lieferbar innerhalb von zwei Wochen
Hackproofing Your Wireless Network als Taschenbuch


Titel: Hackproofing Your Wireless Network
Autor/en: Syngress

ISBN: 1928994598
EAN: 9781928994596
Sprache: Englisch.

Mai 2002 - kartoniert - 608 Seiten


The only way to stop a hacker is to think like one! Wireless technology is a new and rapidly growing field of concentration for network engineers and administrators. Innovative technology is now making the communication between computers a cordless affair. Wireless devices and networks are vulnerable to additional security risks because of their presence in the mobile environment. Hack Proofing Your Wireless Network is the only book written specifically for architects, engineers, and administrators responsible for securing their wireless networks. From making sense of the various acronyms (WAP, WEP, SSL, PKE, PKI, SSL, SSH, IPSEC) to the implementation of security policies, plans, and recovery protocols, this book will help users secure their wireless network before its security is compromised. The only way to stop a hacker is to think like one...this book details the multiple ways a hacker can attack a wireless network - and then provides users with the knowledge they need to prevent said attacks. Uses forensic-based analysis to give the reader an insight into the mind of a hacker With the growth of wireless networks architects, engineers and administrators will need this book Up to the minute Web based support at www.solutions@syngress.com



Chapter 1 The Wireless Challenge


Wireless Technology Overview

Defining Cellular-based Wireless

Defining the Wireless LAN

The Convergence of Wireless Technologies

Trends and Statistics

Understanding the Promise of Wireless

Wireless Networking

Understanding the Benefits of Wireless






Facing the Reality of Wireless Today

Standards Conflicts

Commercial Conflicts

Market Adoption Challenges

The Limitations of "Radio

The Limitations of Wireless Security

Examining the Wireless Standards

Cellular-based Wireless Networks

Wireless LAN Networks

Understanding Public Key Infrastructures and Wireless Networking


Solutions Fast Track

Frequently Asked Questions

Chapter 2 A Security Primer


Understanding Security Fundamentals and Principles of Protection

Ensuring Confidentiality

Ensuring Integrity

Ensuring Availability

Ensuring Privacy

Ensuring Authentication

Ensuring Authorization

Ensuring Non-repudiation

Accounting and Audit Trails

Using Encryption

Reviewing the Role of Policy

Identifying Resources

Understanding Classification Criteria

Implementing Policy

Recognizing Accepted Security and Privacy Standards

Reviewing Security Standards

Reviewing Privacy Standards and Regulations

Addressing Common Risks and Threats

Experiencing Loss of Data

Experiencing Denial and Disruption of Service


Preempting the Consequences of an Organization's Loss


Solutions Fast Track

Frequently Asked Questions

Chapter 3 Wireless Network

Architecture and Design


Fixed Wireless Technologies

Multichannel Multipoint Distribution Service

Local Multipoint Distribution Services

Wireless Local Loop

Point-to-Point Microwave

Wireless Local Area Networks

Why the Need for a Wireless LAN Standard?

Developing WLANs through the 802.11 Architecture

The Basic Service Set

The Extended Service Set

The CSMA-CA Mechanism

Configuring Fragmentation

Using Power Management Options

Multicell Roaming

Security in the WLAN

Developing WPANs through the 802.15 Architecture



High Performance Radio LAN

Mobile Wireless Technologies

First Generation Technologies

Second Generation Technologies

2.5G Technology

Third Generation Technologies

Wireless Application Protocol

Global System for Mobile Communications

General Packet Radio Service

Short Message Service

Optical Wireless Technologies

Exploring the Design Process

Conducting the Preliminary Investigation

Performing Analysis of the Existing Environment

Creating a Preliminary Design

Finalizing the Detailed Design

Executing the Implementation

Capturing the Documentation

Creating the Design Methodology

Creating the Network Plan

Developing the Network Architecture

Reviewing and Validating the Planning Phase

Creating a High-Level Topology

Creating a Collocation Architecture

Defining the High-Level Services

Formalizing the Detailed Design Phase

Understanding Wireless Network Attributes from a Design Perspective

Application Support

Physical Landscape

Network Topology


Solutions Fast Track

Frequently Asked Questions

Chapter 4 Common Attacks and Vulnerabilities


The Weaknesses in WEP

Criticisms of the Overall Design

Weaknesses in the Encryption Algorithm

Weaknesses in Key Management

Weaknesses in User Behavior

Conducting Reconnaissance

Finding a Target

Finding Weaknesses in a Target

Exploiting Those Weaknesses

Sniffing, Interception, and Eavesdropping

Defining Sniffing

Sample Sniffing Tools

Sniffing Case Scenario

Protecting Against Sniffing and Eavesdropping

Spoofing and Unauthorized Access

Defining Spoofing

Sample Spoofing T
089 - 70 80 99 47

Mo. - Fr. 8.00 - 20.00 Uhr
Sa. 10.00 - 20.00 Uhr
089 - 30 75 75 75

Mo. - Sa. 9.00 - 20.00 Uhr
Bleiben Sie in Kontakt:
Sicher & bequem bezahlen:
akzeptierte Zahlungsarten: Überweisung, offene Rechnung,
Visa, Master Card, American Express, Paypal
Zustellung durch:
* Alle Preise verstehen sich inkl. der gesetzlichen MwSt. Informationen über den Versand und anfallende Versandkosten finden Sie hier.
** im Vergleich zum dargestellten Vergleichspreis.