|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910271030103321 |
|
|
Autore |
Coleman David |
|
|
Titolo |
CWSP : certified wireless security professional study guide CWSP-205 / / David Coleman, David Westcott, Bryan Harkins |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Indianapolis, Indiana : , : Sybex, , 2017 |
|
©2017 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-119-41934-4 |
1-119-24413-7 |
|
|
|
|
|
|
|
|
Edizione |
[2nd ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (699 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Wireless communication systems - Security measures |
Electronic data processing personnel - Certification |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
CWSP® Certified Wireless Security Professional: Study Guide CWSP-205; Acknowledgments; About the Authors; Contents at a Glance; Contents; Table of Exercises; Foreword; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1 WLAN Security Overview; Standards Organizations; International Organization for Standardization (ISO); Institute of Electrical and Electronics Engineers (IEEE); Internet Engineering Task Force (IETF); Wi-Fi Alliance; 802.11 Networking Basics; 802.11 Security Basics; Data Privacy; Authentication, Authorization, Accounting (AAA); Segmentation; Monitoring; Policy |
802.11 Security History802.11i Security Amendment and WPA Certifications; Robust Security Network (RSN); Summary; Exam Essentials; Review Questions; Chapter 2 Legacy 802.11 Security; Authentication; Open System Authentication; Shared Key Authentication; Wired Equivalent Privacy (WEP) Encryption; TKIP; Virtual Private Networks (VPNs); Point-to-Point Tunneling Protocol (PPTP); Layer 2 Tunneling Protocol (L2TP); Internet Protocol Security (IPsec); Secure Sockets Layer (SSL); VPN Configuration Complexity; VPN Scalability; MAC Filters; SSID Segmentation; SSID Cloaking; Summary; Exam Essentials |
Review QuestionsChapter 3 Encryption Ciphers and Methods; Encryption Basics; Symmetric and Asymmetric Algorithms; Stream and |
|
|
|
|