資料來源: Google Book

Wi-Fi security

  • 作者: Miller, Stewart S.
  • 出版: New York ;London : McGraw-Hill ©2003.
  • 稽核項: 1 online resource (xviii, 309 pages) :illustrations.
  • 叢書名: McGraw-Hill networking professional
  • 標題: Electronic books. , COMPUTERS Internet -- Security. , InternetSecurity. , COMPUTERS , SécuritéMesures. , Réseaux locaux sans fil Sécurité -- Mesures. , SecurityGeneral. , Wireless LANs Security measures. , COMPUTERS Networking -- Security. , Wireless LANs , Réseaux locaux sans fil , NetworkingSecurity. , IEEE 802.11 (Standard) , Security measures. , IEEE 802.11 (Norme) , COMPUTERS Security -- General.
  • ISBN: 0071429174 , 9780071429177
  • ISBN: 0071410732 , 9780071410731
  • 試查全文@TNUA:
  • 附註: Cover and spine title: WiFi security. Includes index. Copyright; CONTENTS; PREFACE; CHAPTER 1 Introduction to Wireless LAN Security Standards ; Wireless Defined; Factors of Security; Theft; Access Control; Authentication; Encryption; Safeguards; Intrusion Detection Systems; IEEE; WECA; Wi-Fi; The Many Flavors of 802.11; FHSS; DSSS; OFDM; Bluetooth; Differences between the Wireless Standards; Conclusion: How Security Applies; CHAPTER 2 Technology Comparisons ; HomeRF; 802.11 versus SWAP; SWAP Specification; Integrating Wireless Phone and Data; Bluetooth; Wireless Hacking; NetStumbler; NetStumbler Software Uses; Script Kiddies; Facts. Bluetooth TechnologyBluetooth Background; What Gives Bluetooth Its Bite?; Bluetooth Spectrum Hopping; Bluetooth Connections; Enforcing Security; Link Me Up!; Conclusion: The Future of the WLAN; CHAPTER 3 Wireless LAN Security Factors ; Enabling Encryption Security; WEP Encryption; Encrypting 802.11b?; Network Interface Cards; Cross-Platform Hacking; Eavesdropping; Breaking In!; Counterfeiting; Wireless DoS Attack; Points of Vulnerability; Your Best Defense Against an Attack; Conclusion: Keeping Your WLAN Secure; CHAPTER 4 Issues in Wireless Security ; The State of Wireless LAN Security. Securing Your WLANAuthenticating Data; Client Authentication in a Closed System; Shared Key Authentication; RC4; Ensuring Privacy; Keeping Data Intact; Managing Keys; WLAN Vulnerabilities; Subtle Attacks; Common Security Pitfalls; Poor Security, Better than No Security at All!; Short Keys; Initialization Vectors; Shared Keys; Checks and Balances for Packets; Authentication; Location! Location! Location!; Attack Patterns; Active Attack Patterns; Passive Attacks; Conclusion; CHAPTER 5 The 802.11 Standard Defined ; The 802.11 Standard; Issues to Consider; Expanding the Network Standard. Ad Hoc NetworksExtended Service Set; Wireless Radio Standard; The Standard Algorithm; Address Spaces; The 802.11 Standard in Security; Encryption; Timing and Power Management; Speed; Compatibility; Standard "Flavors" of 802.11; 802.11a; 802.11b; 802.11d; 802.11e; 802.11f; 802.11g; 802.11h; 802.11i; Conclusion: Evolution of the 802.11 Standard; CHAPTER 6 802.11 Security Infrastructure ; Point-to-Point Wireless Application Security; Point of Interception; Wireless Vulnerability; Building a Private Wireless Infrastructure; Vulnerable Encryption; Commercial Security Infrastructure. Building a Private InfrastructureItems to Compromise; Deploying Your Wireless Infrastructure; Determining Requirements; Choosing a Flavor of 802.11; Security Design; Monitoring Activity; Conclusion: Maintaining a Secure Infrastructure; CHAPTER 7 802.11 Encryption: Wired Equivalent Privacy ; Why WEP?; Defending Your Systems; WEP Mechanics; Wireless Security Encryption; Insecure Keys; Taking a Performance Hit; Wireless Authentication; Known WEP Imperfections; Access Control; IRL Security; Points of Vulnerability; Conclusion: Finding Security in an Unsecured World. Includes index.
  • 電子資源: https://dbs.tnua.edu.tw/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=86830
  • 系統號: 005303705
  • 資料類型: 電子書
  • 讀者標籤: 需登入
  • 引用網址: 複製連結
By following this resource, corporations can go wireless and still protect mission-critical data. Top corporate security consultant Stewart Miller covers security for Windows, Linux, Macs, Palms, and other PDAs and shows how to prevent breaches caused by weak encryption protocols. * Review security approaches for the different standards currently competing for the U.S. market * Addresses data compromise, unauthorized access, and denial of service--all critical to WLAN users * Covers the 802.11 IEEE standard in regards to security, performance, and throughput * Discusses encryption and privacy through the WEP (Wired Equivalent Privacy) protocol
來源: Google Book
評分