00980nam a22002413i 450099100104693970753620040209115902.0040318s1983 it |||||||||||||||||ita b12709980-39ule_instARCHE-069424ExLDip.to FilosofiaitaA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l.345Vinciguerra, Sergio226097La riforma del sistema punitivo nella L. 24 novembre 1981, n. 689 :infrazione amministrativa e reato /Sergio VinciguerraPadova :CEDAM,1983XI, 452 p. ;25 cmGiustizia penale.b1270998002-04-1431-03-04991001046939707536LE005 DIR I A 24112005000152009le005-E0.00-l- 00000.i1323313031-03-04Riforma del sistema punitivo nella L. 24 novembre 1981, n. 689269643UNISALENTOle00531-03-04ma -itait 3105305nam 22006614a 450 991102018980332120200520144314.0978661027248897812802724861280272481978047029978404702997899780470869680047086968297804708696970470869690(CKB)111087027098556(EBL)219755(OCoLC)53909501(SSID)ssj0000243185(PQKBManifestationID)11191190(PQKBTitleCode)TC0000243185(PQKBWorkID)10321180(PQKB)11539847(MiAaPQ)EBC219755(Perlego)2774738(EXLCZ)9911108702709855620030724d2003 uy 0engur|n|---|||||txtccrSecuring wireless LANs a practical guide for network managers, LAN administrators, and the home office user /Gilbert HeldHoboken, NJ J. Wileyc20031 online resource (274 p.)Description based upon print version of record.9780470851272 0470851279 Includes bibliographical references and index.securing wireless LANs; contents; Preface; Acknowledgements; Chapter 1 Introduction to Wireless LANs; 1.1 SECURING THE INSECURE; 1.1.1 AAE AND A FUNCTIONS; 1.1.2 AUTHENTICATION; 1.1.3 AUTHORIZATION; 1.1.4 ENCRYPTION; 1.1.5 ACCOUNTING; 1.1.6 PRACTICAL NETWORK PROTECTION METHODS; 1.2 NETWORK ARCHITECTURE; 1.2.1 BASIC NETWORKING DEVICES; 1.2.2 THE WIRELESS LAN STATION; 1.2.3 THE ACCESS POINT; 1.2.4 THE WIRELESS BRIDGE; 1.2.5 THE WIRELESS ROUTER; 1.2.6 THE BASIC SERVICE SET; 1.2.7 THE EXTENDED SERVICE SET (ESS); 1.2.8 STATION SERVICES; 1.3 IEEE WIRELESS LAN STANDARDS1.3.1 THE BASIC IEEE 802.11 STANDARD1.3.2 802.11B; 1.3.3 802.11A; 1.3.4 802.11C; 1.3.5 802.11D; 1.3.6 802.11E; 1.3.7 802.11F; 1.3.8 802.11G; 1.3.9 802.11H; 1.3.10 802.11I; 1.4 BOOK PREVIEW; 1.4.1 FRAME FORMATS AND BASIC SECURITY OPERATIONS; 1.4.2 UNDERSTANDING WIRELESS SIGNALS; 1.4.3 UNDERSTANDING WEP; 1.4.4 SECURITY RISKS; 1.4.5 PROPRIETARY SECURITY ENHANCEMENT TECHNIQUES; 1.4.6 STANDARDS BASED SECURITY; Chapter 2 Frame Formats and Basic Security Operation; 2.1 FRAME FORMATS; 2.1.1 BASIC FRAME FORMAT; 2.1.2 FRAME CONTROL FIELD; 2.1.3 CONTROL FRAMES; 2.1.4 MANAGEMENT FRAMES2.1.5 THE AUTHENTICATION PROCESS2.2 WEP AND PRIVACY; 2.2.1 MISCONCEPTIONS; 2.2.2 DEVELOPMENT CONSTRAINTS; 2.2.3 DEFICIENCIES; Chapter 3 Understanding Wireless Signals; 3.1 THE WIRELESS RF SPECTRUM AND BASIC MEASUREMENTS; 3.1.1 FREQUENCY; 3.1.2 PERIOD AND WAVELENGTH; 3.1.3 BANDWIDTH; 3.1.4 THE FREQUENCY SPECTRUM; 3.1.5 POWER MEASUREMENTS; 3.1.6 POWER LEVEL; 3.1.7 SIGNAL-TO-NOISE RATIO; 3.2 ANTENNA BASICS; 3.2.1 BASIC OPERATION; 3.2.2 CATEGORIES; 3.2.3 ANTENNA GAIN; 3.2.4 DIRECTIONALITY AND EIRP; 3.2.5 POWER LEVELS; 3.2.6 PROPAGATION LOSS; 3.2.7 INCREASING ANTENNA GAIN; 3.2.8 POWER LIMITS3.2.9 RECEIVER SENSITIVITY3.2.10 REDUCING EMITTED RADIATION; 3.2.11 HORIZONTAL TRANSMISSION DISTANCE; 3.2.12 EQUIPMENT POSITIONING; 3.2.13 USING MONITORING EQUIPMENT; Chapter 4 Understanding WEP; 4.1 THE WEP FRAME BODY; 4.1.1 THE IV; 4.1.2 THE ICV; 4.1.3 THE NAKED DEFAULT; 4.1.4 WEP KEY LIMITATIONS; 4.2 LOCATING AND OBSERVING WIRELESS LAN TRAFFIC; 4.2.1 NETWORK STUMBLER; 4.2.2 MONITORING WITH AIROPEEK; 4.3 RC4; 4.3.1 OVERVIEW; 4.3.2 OPERATION; 4.3.3 ILLUSTRATIVE EXAMPLE; 4.3.4 STRENGTHS AND WEAKNESSES; 4.4 WEP WEAKNESS; 4.4.1 UNSAFE AT ANY SIZE; 4.4.2 THE INSECURITY OF 802.114.4.3 EXPLOITING RC4 WEAKNESS4.4.4 BREAKING WEP; 4.4.5 AIRSNORT; 4.4.6 WEPCRACK; Chapter 5 Security Risks and Countermeasures; 5.1 THE SSID; 5.1.1 OVERVIEW; 5.1.2 OVERRIDING THE SSID; 5.1.3 OBTAINING THE SSID; 5.1.4 COUNTERMEASURES; 5.2 EAVESDROPPING; 5.2.1 OVERVIEW; 5.2.2 THREATS; 5.2.3 COUNTERMEASURES; 5.3 MASQUERADE; 5.3.1 OVERVIEW; 5.3.2 COUNTERMEASURES; 5.4 DATA MODIFICATION; 5.4.1 OVERVIEW; 5.4.2 COUNTERMEASURES; 5.5 FILE SHARING; 5.5.1 OVERVIEW; 5.5.2 WINDOWS 95; 5.5.3 WINDOWS 2000; 5.5.4 COUNTERMEASURES; 5.6 JAMMING; 5.6.1 OVERVIEW; 5.6.2 COUNTERMEASURES; 5.7 ENCRYPTION ATTACKS5.7.1 OVERVIEWWireless LANs will enable small teams and communities to communicate via their mobile devices without cables. This new technology will facilitate communication in small businesses/teams such as in hospitals, on construction sites, warehouses, etc.Held provides a comprehensive guide to the implementation, planning and monitoring of all aspects of wireless LAN security in small offices/small to medium business (SMBs).Securing Wireless LANs is timely in addressing the security issues of this important new technology and equips its readers with the tools they need to make the approWireless LANsSecurity measuresWireless LANsSecurity measures.005.8Held Gilbert1943-27769MiAaPQMiAaPQMiAaPQBOOK9911020189803321Securing wireless LANs4420816UNINA