LEADER 05167nam 22006494a 450 001 9910953376103321 005 20250306183024.0 010 $a9780764579776 010 $a0764579770 035 $a(CKB)1000000000244184 035 $a(EBL)215155 035 $a(OCoLC)70720200 035 $a(SSID)ssj0000272646 035 $a(PQKBManifestationID)11204985 035 $a(PQKBTitleCode)TC0000272646 035 $a(PQKBWorkID)10309178 035 $a(PQKB)10432159 035 $a(MiAaPQ)EBC215155 035 $a(Perlego)2789467 035 $a(EXLCZ)991000000000244184 100 $a20040525d2004 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aWireless networks for dummies /$fby Barry Lewis and Peter T. Davis 210 $aHoboken, NJ $cWiley Pub.$dc2004 215 $a1 online resource (410 p.) 225 1 $a--For dummies 300 $aIncludes index. 311 08$a9780764575259 311 08$a0764575252 327 $aWireless Networks For Dummies; About the Author; Dedication; Author's Acknowledgments; Contents at a Glance; Table of Contents; Introduction; About This Book; How to Use This Book; How This Book Is Organized; Icons Used in This Book; Where to Go from Here; Part I: Planning and Acquiring Your Network; Chapter 1: Removing the Tethers: Entering the Wireless World; Understanding the Risks and Rewards of Going Wireless; Applications of Wireless Networks; Sorting Out the Nets: Do I Need a WPAN, WLAN, or WMAN?; Using Wireless Networks; Turning a Notion into a Network 327 $aConvergence of Wireless Technologies - What Will the Future Hold?Chapter 2: If You Fail to Plan, You Plan to Fail; Evaluating Your Wireless Needs; Preparing for a Site Survey; Using Site Survey Equipment to Get It Right; Doing That Site Survey; Describing Your Final Plan in a Site Survey Report; Chapter 3: Matching Wireless Technologies to Your Plan; Choosing the Right Networking Hardware; Are You Being Served? IBSS, BSS, and ESS; Selecting the Wireless Mode; Gearing Up to Send and Receive Signals; Understanding and Using Layer 2 and 3 Concepts; Part II: Implementing Your Wireless Network 327 $aChapter 4: Getting a Quick Start with Wireless Personal Area NetworksUnderstanding IrDA; Understanding Bluetooth; IrDA and Bluetooth Comparison; Chapter 5: Moving On to a Wireless LAN: Your Wireless Access Point; Parts Is Parts - Do You Have Them All?; Connecting and Configuring Your Access Point; Initial Setup and Testing; Turning Off the Defaults; Testing the Signal; Chapter 6: Connecting Your Clients; Adding Hardware to the PC; Installing the Wireless Hardware; Configuring the Client's Operating System; Making Sure the Connection Works; Chapter 7: Building the Multi-Zone Network 327 $aRoaming Around with a Wireless MachineLoad Balancing - Are All Zones Used Equally?; Chapter 8: Using Wireless on the Road to Connect to the Office; Spontaneous Communities: Ad Hoc Networks; Wi-Fi Warriors on the Road; E-Mailing Wirelessly with Microsoft Exchange; Wireless Hot Spots: What's New Around the World?; Part III: Using Your Network Securely; Chapter 9: Considering a Deadbolt: Understanding the Risks of Wireless Networks; Risks to the Network; Risks to Your Users; Risks to Your Data; Chapter 10: Designing a Secure Network; Security as a Cost of Doing Business 327 $aDeveloping a Security ArchitectureDeveloping a Wireless Security Policy; Developing Wireless Security Standards; Developing Wireless Security Best Practices; Managing Your Wireless Security Policy; Designing a Secure Network; Performing a Risk Analysis; Chapter 11: Maintaining Network Security; Understanding Security Mechanisms; Three States of Authentication; Protecting Privacy; Protecting Message Integrity; Filtering the Chaff; Using Encryption; Protecting WEP Keys; Using Port Authentication; Chapter 12: Secure Wireless Access with Virtual Private Networking; Secure Access with a VPN 327 $aDeploying VPNs in WLANs 330 $aYou've probably heard the expression, "It's time to cut the cord." Well, it may be time to "cut the cables" at your office and free yourself from your desk and computer. Wireless networks are the waves of the future-literally. Wireless Networks For Dummies guides you from design through implementation to ongoing protection of your system and your information so you can:Remain connected to the office in airports and hotelsAccess the Internet and other network resources in the lunchroom, conference room, or anywhere there's an access pointUse your PDA or lapt 410 0$a--For dummies. 517 $aWireless Networks for Dummies. 517 $aFor Dummies 531 $aWIRELESS NETWORKS FOR DUMMIES 606 $aWireless LANs$vAmateurs' manuals 615 0$aWireless LANs 676 $a004.6/8 676 $a004.68 700 $aLewis$b Barry$0303744 701 $aDavis$b Peter T$0288243 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910953376103321 996 $aWireless networks for dummies$94329768 997 $aUNINA LEADER 04961nam 22006253u 450 001 9910962503203321 005 20251117115942.0 035 $a(CKB)1000000000002788 035 $a(EBL)3410565 035 $a(SSID)ssj0000672820 035 $a(PQKBManifestationID)11362656 035 $a(PQKBTitleCode)TC0000672820 035 $a(PQKBWorkID)10636364 035 $a(PQKB)10362281 035 $a(MiAaPQ)EBC3410565 035 $a(EXLCZ)991000000000002788 100 $a20151005d2002|||| u|| | 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aExamInsight For CompTIA Security+ Certification (SY0-101) 205 $a2nd ed. 210 $aFriendswood $cTotalRecall Publications$d2002 215 $a1 online resource (570 p.) 300 $aDescription based upon print version of record. 311 08$a1-59095-672-9 327 $a""ExamInsight For Exam SY0-101""; ""About the Authors""; ""Contributing Authors and Editors""; ""About the Book""; ""Other Resources""; ""Table of Contents""; ""Frequently Asked Questions""; ""Preface and Acknowledgments""; ""How To Read This Book""; ""Icon Alerts""; ""Security+ 2002 Exam Specifics""; ""Introduction""; ""Chapter 0000: Read.Me""; ""The biggest challenge in security is people5.""; ""0.1Youa???re saveda???.If""; ""0.2Hacker vs. Cracker""; ""0.3Security Tao""; ""0.4Security Checklist""; ""0.5Security""; ""Technical Oxymoron""; ""0.6Resources""; ""0.7SpyWare""; ""0.8Summary"" 327 $a""Chapter 0001: Domain 1.0:""""General Security Concepts (30%)""; ""Getting Ready - Questions""; ""Getting Ready - Answers""; ""1.0 General Security Concepts""; ""1.1 Access Control""; ""1.1.1 MAC/DAC/RBAC""; ""Mandatory Access Control""; ""Discretionary Access Control""; ""Role-Based Access Control""; ""1.2 Authentication""; ""1.2.1 Kerberos""; ""How does Kerberos authentication work?""; ""1.2.2 CHAP""; ""1.2.3 Certificates""; ""1.2.4 Username/Password""; ""1.2.5 Tokens""; ""1.2.6 Multi-Factor""; ""1.2.7 Mutual Authentication""; ""1.2.8 Biometrics"" 327 $a""1.3 Non-essential Services and Protocols""""""; ""Pop Quiz 0000.00""; ""1.4 Attacks""; ""1.4.1 DoS/DDoS""; ""An early DDoS attack""; ""How and why do these attacks work?""; ""What can I do?""; ""1.4.2 Backdoors""; ""Whata???s a Rootkit?""; ""How do backdoors get onto a system?""; ""How do we stop back doors?""; ""1.4.3 Spoofing""; ""How TCP/IP permits spoofing""; ""Problem #1""; ""Problem #2 a???""; ""Types of spoofing""; ""How can we protect our network from spoofing?""; ""1.4.4 Man in the Middle""; ""1.4.5 Replay""; ""1.4.6 TCP/IP Hijacking""; ""1.4.7 Weak Keys""; ""1.4.8 Mathematical"" 327 $a""1.4.9 Social Engineering""""1.4.10 Birthday""; ""1.4.11 Password Guessing""; ""1.4.11.1 Brute Force""; ""1.4.11.2 Dictionary""; ""1.4.12 Software Exploitation""; ""Buffer overflows""; ""NaA?v?e web applications""; ""1.5 Malicious Code""; ""1.5.1 Viruses""; ""1.5.2 Trojan Horses""; ""1.5.3 Logic Bombs""; ""1.5.4 Worms""; ""1.6 Social Engineering""; """"; ""Pop Quiz 0001.00""; ""1.7 Auditing""; """"; ""Configuration and Log Analysis""; ""System/Network Scanning""; ""1.8 Summary""; ""1.9Success Questions""; ""Success Answers""; ""Chapter 0010: Domain 2.0:""; ""Communication Security (20%)"" 327 $a""Getting Ready a??? Questions""""Getting Ready a??? Answers""; ""2.0 Communication Security""; ""2.1 Remote Access""; ""2.1.1 802.1X""; ""Why is 802.1X needed?""; ""What is 802.1X?""; ""2.1.2 VPN""; ""2.1.3 RADIUS""; ""2.1.4 TACACS/XTACACS/TACACS+""; ""2.1.5 L2TP/PPTP""; ""PPTP""; ""TCP/IP Background Information""; ""L2TP""; ""2.1.6 SSH""; ""2.1.7 IPSEC""; ""IPSec packet types""; ""Transport and Tunnel Modes of IPSec""; ""IPSec and Encryption""; ""IPSec vs. DoS Attacks""; ""IPSec Interoperability""; ""2.1.8 Vulnerabilities""; ""2.2 Email""; ""2.2.1 S/MIME""; ""2.2.2 PGP"" 327 $a""2.2.3 Vulnerabilities"" 606 $aComputer networks -- Security measures -- Examinations -- Study guides 606 $aComputer security -- Examinations -- Study guides 606 $aElectronic books. -- local 606 $aElectronic data processing personnel -- Certification 606 $aEngineering & Applied Sciences$2HILCC 606 $aComputer Science$2HILCC 615 4$aComputer networks -- Security measures -- Examinations -- Study guides. 615 4$aComputer security -- Examinations -- Study guides. 615 4$aElectronic books. -- local. 615 4$aElectronic data processing personnel -- Certification. 615 7$aEngineering & Applied Sciences 615 7$aComputer Science 676 $a005.8/076 700 $aCatura-Houser$b Tim$01871191 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 906 $aBOOK 912 $a9910962503203321 996 $aExamInsight For CompTIA Security+ Certification (SY0-101)$94532377 997 $aUNINA