05490nam 2200709Ia 450 991082341710332120200520144314.01-281-07833-697866110783310-08-050822-7(CKB)1000000000339648(EBL)274288(OCoLC)181421147(SSID)ssj0000173745(PQKBManifestationID)11172636(PQKBTitleCode)TC0000173745(PQKBWorkID)10185445(PQKB)11269824(Au-PeEL)EBL274288(CaPaEBR)ebr10150166(CaONFJC)MIL107833(OCoLC)935261561(CaSebORM)9781597490870(MiAaPQ)EBC274288(OCoLC)824876117(OCoLC)ocn824876117 (EXLCZ)99100000000033964820061026d2006 uy 0engur|n|---|||||txtccrHow to cheat at securing a wireless network /Chris Hurley ... [et al.]1st editionRockland, Mass. Syngress Mediac20061 online resource (481 p.)How to CheatIncludes index.1-59749-087-3 Front Cover; Securing a Wireless Network; Contents; Chapter 1. Introduction to Wireless: From Past to Present; Introduction; Exploring Past Discoveries That Led to Wireless; Exploring Present Applications for Wireless; Exploring This Book on Wireless; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Wireless Security; Introduction; Enabling Security Features on a Linksys WRT54G 802.11g Access Point; Enabling Security Features on a D-Link DI-624 AirPlus 2.4 GHz Xtreme G Wireless Router with Four-Port Switch; Enable Wi-Fi Protected AccessEnabling Security Features on Apple's Airport Extreme 802.11g Access PointEnabling Security Features on a Cisco 1100 Series Access Point; Enabling Security Features on Wireless Clients; Understanding and Configuring 802.1X RADIUS Authentication; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Dangers of Wireless Devices in the Workplace; Introduction; Intruders Accessing Legitimate Access Points; Intruders Connecting to Rogue Wireless Access Points; Intruders Connecting to WLAN Cards; Summary; Solutions Fast Track; Frequently Asked QuestionsChapter 4. WLAN Rogue Access Point Detection and MitigationIntroduction; The Problem with Rogue Access Points; Preventing and Detecting Rogue Access Points; IEEE 802.1x Port-based Security to Prevent Rogue Access Points; Using Catalyst Switch Filters to Limit MAC Addresses per Port; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Wireless LAN VLANs; Introduction; Understanding VLANs; VLANs in a Wireless Environment; Wireless VLAN Deployment; Configuring Wireless VLANs Using the IOS: A Case Study; Broadcast Domain Segmentation; Primary (Guest) and Secondary SSIDsUsing RADIUS for VLAN Access ControlSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Designing a Wireless Network; Introduction; Exploring the Design Process; Identifying the design methodology; Understanding Wireless Network Attributes from a Design Perspective; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Wireless Network Architecture and Design; Fixed Wireless Technologies; Developing WLANs through the 802.11 Architecture; Developing WPANs through the 802.15 Architecture; Mobile Wireless Technologies; Optical Wireless Technologies; SummarySolutions Fast TrackFrequently Asked Questions; Chapter 8. Monitoring and Intrusion Detection; Introduction; Designing for Detection; Defensive Monitoring Considerations; Intrusion Detection Strategies; Conducting Vulnerability Assessments; Incident Response and Handling; Conducting Site Surveys for Rogue Access Points; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Designing a Wireless Enterprise Network: Hospital Case Study; Introduction; Introducing the Enterprise Case Study; Designing a Wireless Solution; Implementing and Testing the Wireless SolutionLessons LearnedWireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless networkWith the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the network's How to CheatSecuring a wireless networkComputer networksSecurity measuresHandbooks, manuals, etcWireless communication systemsSecurity measuresComputer networksSecurity measuresWireless communication systemsSecurity measures.621.3845Hurley Chris627561MiAaPQMiAaPQMiAaPQBOOK9910823417103321How to cheat at securing a wireless network3993302UNINA