LEADER 05490nam 2200709Ia 450 001 9910823417103321 005 20200520144314.0 010 $a1-281-07833-6 010 $a9786611078331 010 $a0-08-050822-7 035 $a(CKB)1000000000339648 035 $a(EBL)274288 035 $a(OCoLC)181421147 035 $a(SSID)ssj0000173745 035 $a(PQKBManifestationID)11172636 035 $a(PQKBTitleCode)TC0000173745 035 $a(PQKBWorkID)10185445 035 $a(PQKB)11269824 035 $a(Au-PeEL)EBL274288 035 $a(CaPaEBR)ebr10150166 035 $a(CaONFJC)MIL107833 035 $a(OCoLC)935261561 035 $a(CaSebORM)9781597490870 035 $a(MiAaPQ)EBC274288 035 $a(OCoLC)824876117 035 $a(OCoLC)ocn824876117 035 $a(EXLCZ)991000000000339648 100 $a20061026d2006 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aHow to cheat at securing a wireless network /$fChris Hurley ... [et al.] 205 $a1st edition 210 $aRockland, Mass. $cSyngress Media$dc2006 215 $a1 online resource (481 p.) 225 1 $aHow to Cheat 300 $aIncludes index. 311 $a1-59749-087-3 327 $aFront Cover; Securing a Wireless Network; Contents; Chapter 1. Introduction to Wireless: From Past to Present; Introduction; Exploring Past Discoveries That Led to Wireless; Exploring Present Applications for Wireless; Exploring This Book on Wireless; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Wireless Security; Introduction; Enabling Security Features on a Linksys WRT54G 802.11g Access Point; Enabling Security Features on a D-Link DI-624 AirPlus 2.4 GHz Xtreme G Wireless Router with Four-Port Switch; Enable Wi-Fi Protected Access 327 $aEnabling Security Features on Apple's Airport Extreme 802.11g Access PointEnabling Security Features on a Cisco 1100 Series Access Point; Enabling Security Features on Wireless Clients; Understanding and Configuring 802.1X RADIUS Authentication; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Dangers of Wireless Devices in the Workplace; Introduction; Intruders Accessing Legitimate Access Points; Intruders Connecting to Rogue Wireless Access Points; Intruders Connecting to WLAN Cards; Summary; Solutions Fast Track; Frequently Asked Questions 327 $aChapter 4. WLAN Rogue Access Point Detection and MitigationIntroduction; The Problem with Rogue Access Points; Preventing and Detecting Rogue Access Points; IEEE 802.1x Port-based Security to Prevent Rogue Access Points; Using Catalyst Switch Filters to Limit MAC Addresses per Port; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Wireless LAN VLANs; Introduction; Understanding VLANs; VLANs in a Wireless Environment; Wireless VLAN Deployment; Configuring Wireless VLANs Using the IOS: A Case Study; Broadcast Domain Segmentation; Primary (Guest) and Secondary SSIDs 327 $aUsing RADIUS for VLAN Access ControlSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Designing a Wireless Network; Introduction; Exploring the Design Process; Identifying the design methodology; Understanding Wireless Network Attributes from a Design Perspective; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Wireless Network Architecture and Design; Fixed Wireless Technologies; Developing WLANs through the 802.11 Architecture; Developing WPANs through the 802.15 Architecture; Mobile Wireless Technologies; Optical Wireless Technologies; Summary 327 $aSolutions Fast TrackFrequently Asked Questions; Chapter 8. Monitoring and Intrusion Detection; Introduction; Designing for Detection; Defensive Monitoring Considerations; Intrusion Detection Strategies; Conducting Vulnerability Assessments; Incident Response and Handling; Conducting Site Surveys for Rogue Access Points; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Designing a Wireless Enterprise Network: Hospital Case Study; Introduction; Introducing the Enterprise Case Study; Designing a Wireless Solution; Implementing and Testing the Wireless Solution 327 $aLessons Learned 330 $aWireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless networkWith the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the network's 410 0$aHow to Cheat 517 3 $aSecuring a wireless network 606 $aComputer networks$xSecurity measures$vHandbooks, manuals, etc 606 $aWireless communication systems$xSecurity measures 615 0$aComputer networks$xSecurity measures 615 0$aWireless communication systems$xSecurity measures. 676 $a621.3845 701 $aHurley$b Chris$0627561 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910823417103321 996 $aHow to cheat at securing a wireless network$93993302 997 $aUNINA