How to cheat at securing a wireless network [[electronic resource] /] / Chris Hurley ... [et al.] |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, Mass., : Syngress Media, c2006 |
Descrizione fisica | 1 online resource (481 p.) |
Disciplina | 621.3845 |
Altri autori (Persone) | HurleyChris |
Collana | How to Cheat |
Soggetto topico |
Computer networks - Security measures
Wireless communication systems - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-07833-6
9786611078331 0-08-050822-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Securing a Wireless Network; Contents; Chapter 1. Introduction to Wireless: From Past to Present; Introduction; Exploring Past Discoveries That Led to Wireless; Exploring Present Applications for Wireless; Exploring This Book on Wireless; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Wireless Security; Introduction; Enabling Security Features on a Linksys WRT54G 802.11g Access Point; Enabling Security Features on a D-Link DI-624 AirPlus 2.4 GHz Xtreme G Wireless Router with Four-Port Switch; Enable Wi-Fi Protected Access
Enabling Security Features on Apple's Airport Extreme 802.11g Access PointEnabling Security Features on a Cisco 1100 Series Access Point; Enabling Security Features on Wireless Clients; Understanding and Configuring 802.1X RADIUS Authentication; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Dangers of Wireless Devices in the Workplace; Introduction; Intruders Accessing Legitimate Access Points; Intruders Connecting to Rogue Wireless Access Points; Intruders Connecting to WLAN Cards; Summary; Solutions Fast Track; Frequently Asked Questions Chapter 4. WLAN Rogue Access Point Detection and MitigationIntroduction; The Problem with Rogue Access Points; Preventing and Detecting Rogue Access Points; IEEE 802.1x Port-based Security to Prevent Rogue Access Points; Using Catalyst Switch Filters to Limit MAC Addresses per Port; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Wireless LAN VLANs; Introduction; Understanding VLANs; VLANs in a Wireless Environment; Wireless VLAN Deployment; Configuring Wireless VLANs Using the IOS: A Case Study; Broadcast Domain Segmentation; Primary (Guest) and Secondary SSIDs Using RADIUS for VLAN Access ControlSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Designing a Wireless Network; Introduction; Exploring the Design Process; Identifying the design methodology; Understanding Wireless Network Attributes from a Design Perspective; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Wireless Network Architecture and Design; Fixed Wireless Technologies; Developing WLANs through the 802.11 Architecture; Developing WPANs through the 802.15 Architecture; Mobile Wireless Technologies; Optical Wireless Technologies; Summary Solutions Fast TrackFrequently Asked Questions; Chapter 8. Monitoring and Intrusion Detection; Introduction; Designing for Detection; Defensive Monitoring Considerations; Intrusion Detection Strategies; Conducting Vulnerability Assessments; Incident Response and Handling; Conducting Site Surveys for Rogue Access Points; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Designing a Wireless Enterprise Network: Hospital Case Study; Introduction; Introducing the Enterprise Case Study; Designing a Wireless Solution; Implementing and Testing the Wireless Solution Lessons Learned |
Altri titoli varianti | Securing a wireless network |
Record Nr. | UNINA-9910450891203321 |
Rockland, Mass., : Syngress Media, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
How to cheat at securing a wireless network [[electronic resource] /] / Chris Hurley ... [et al.] |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, Mass., : Syngress Media, c2006 |
Descrizione fisica | 1 online resource (481 p.) |
Disciplina | 621.3845 |
Altri autori (Persone) | HurleyChris |
Collana | How to Cheat |
Soggetto topico |
Computer networks - Security measures
Wireless communication systems - Security measures |
ISBN |
1-281-07833-6
9786611078331 0-08-050822-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Securing a Wireless Network; Contents; Chapter 1. Introduction to Wireless: From Past to Present; Introduction; Exploring Past Discoveries That Led to Wireless; Exploring Present Applications for Wireless; Exploring This Book on Wireless; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Wireless Security; Introduction; Enabling Security Features on a Linksys WRT54G 802.11g Access Point; Enabling Security Features on a D-Link DI-624 AirPlus 2.4 GHz Xtreme G Wireless Router with Four-Port Switch; Enable Wi-Fi Protected Access
Enabling Security Features on Apple's Airport Extreme 802.11g Access PointEnabling Security Features on a Cisco 1100 Series Access Point; Enabling Security Features on Wireless Clients; Understanding and Configuring 802.1X RADIUS Authentication; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Dangers of Wireless Devices in the Workplace; Introduction; Intruders Accessing Legitimate Access Points; Intruders Connecting to Rogue Wireless Access Points; Intruders Connecting to WLAN Cards; Summary; Solutions Fast Track; Frequently Asked Questions Chapter 4. WLAN Rogue Access Point Detection and MitigationIntroduction; The Problem with Rogue Access Points; Preventing and Detecting Rogue Access Points; IEEE 802.1x Port-based Security to Prevent Rogue Access Points; Using Catalyst Switch Filters to Limit MAC Addresses per Port; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Wireless LAN VLANs; Introduction; Understanding VLANs; VLANs in a Wireless Environment; Wireless VLAN Deployment; Configuring Wireless VLANs Using the IOS: A Case Study; Broadcast Domain Segmentation; Primary (Guest) and Secondary SSIDs Using RADIUS for VLAN Access ControlSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Designing a Wireless Network; Introduction; Exploring the Design Process; Identifying the design methodology; Understanding Wireless Network Attributes from a Design Perspective; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Wireless Network Architecture and Design; Fixed Wireless Technologies; Developing WLANs through the 802.11 Architecture; Developing WPANs through the 802.15 Architecture; Mobile Wireless Technologies; Optical Wireless Technologies; Summary Solutions Fast TrackFrequently Asked Questions; Chapter 8. Monitoring and Intrusion Detection; Introduction; Designing for Detection; Defensive Monitoring Considerations; Intrusion Detection Strategies; Conducting Vulnerability Assessments; Incident Response and Handling; Conducting Site Surveys for Rogue Access Points; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Designing a Wireless Enterprise Network: Hospital Case Study; Introduction; Introducing the Enterprise Case Study; Designing a Wireless Solution; Implementing and Testing the Wireless Solution Lessons Learned |
Altri titoli varianti | Securing a wireless network |
Record Nr. | UNINA-9910784271603321 |
Rockland, Mass., : Syngress Media, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
How to cheat at securing a wireless network / / Chris Hurley ... [et al.] |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, Mass., : Syngress Media, c2006 |
Descrizione fisica | 1 online resource (481 p.) |
Disciplina | 621.3845 |
Altri autori (Persone) | HurleyChris |
Collana | How to Cheat |
Soggetto topico |
Computer networks - Security measures
Wireless communication systems - Security measures |
ISBN |
1-281-07833-6
9786611078331 0-08-050822-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Securing a Wireless Network; Contents; Chapter 1. Introduction to Wireless: From Past to Present; Introduction; Exploring Past Discoveries That Led to Wireless; Exploring Present Applications for Wireless; Exploring This Book on Wireless; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Wireless Security; Introduction; Enabling Security Features on a Linksys WRT54G 802.11g Access Point; Enabling Security Features on a D-Link DI-624 AirPlus 2.4 GHz Xtreme G Wireless Router with Four-Port Switch; Enable Wi-Fi Protected Access
Enabling Security Features on Apple's Airport Extreme 802.11g Access PointEnabling Security Features on a Cisco 1100 Series Access Point; Enabling Security Features on Wireless Clients; Understanding and Configuring 802.1X RADIUS Authentication; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Dangers of Wireless Devices in the Workplace; Introduction; Intruders Accessing Legitimate Access Points; Intruders Connecting to Rogue Wireless Access Points; Intruders Connecting to WLAN Cards; Summary; Solutions Fast Track; Frequently Asked Questions Chapter 4. WLAN Rogue Access Point Detection and MitigationIntroduction; The Problem with Rogue Access Points; Preventing and Detecting Rogue Access Points; IEEE 802.1x Port-based Security to Prevent Rogue Access Points; Using Catalyst Switch Filters to Limit MAC Addresses per Port; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Wireless LAN VLANs; Introduction; Understanding VLANs; VLANs in a Wireless Environment; Wireless VLAN Deployment; Configuring Wireless VLANs Using the IOS: A Case Study; Broadcast Domain Segmentation; Primary (Guest) and Secondary SSIDs Using RADIUS for VLAN Access ControlSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Designing a Wireless Network; Introduction; Exploring the Design Process; Identifying the design methodology; Understanding Wireless Network Attributes from a Design Perspective; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Wireless Network Architecture and Design; Fixed Wireless Technologies; Developing WLANs through the 802.11 Architecture; Developing WPANs through the 802.15 Architecture; Mobile Wireless Technologies; Optical Wireless Technologies; Summary Solutions Fast TrackFrequently Asked Questions; Chapter 8. Monitoring and Intrusion Detection; Introduction; Designing for Detection; Defensive Monitoring Considerations; Intrusion Detection Strategies; Conducting Vulnerability Assessments; Incident Response and Handling; Conducting Site Surveys for Rogue Access Points; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Designing a Wireless Enterprise Network: Hospital Case Study; Introduction; Introducing the Enterprise Case Study; Designing a Wireless Solution; Implementing and Testing the Wireless Solution Lessons Learned |
Altri titoli varianti | Securing a wireless network |
Record Nr. | UNINA-9910823417103321 |
Rockland, Mass., : Syngress Media, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
InfoSec career hacking [[electronic resource] ] : sell your skillz, not your soul / / Aaron W. Bayles et al; forward by Christopher W. Klaus |
Autore | Bayles Aaron W |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2005 |
Descrizione fisica | 1 online resource (473 p.) |
Disciplina | 004.023 |
Altri autori (Persone) |
BrindleyEd
FosterJames C HurleyChris LongJohnny |
Soggetto topico |
Computer hackers
Computer security |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-02028-1
9786611020286 0-08-048903-6 1-59749-043-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; Contents; Foreword; The Targets-What I Want to Be When I Grow Up (or at Least Get Older); Reconnaissance: Social Engineering for Profit; Enumerate: Determine What's Out There; First Strike: Basic Tactics for Successful Exploitation; The Laws of Security; No Place Like /home - Creating an Attack Lab; Vulnerability Disclosure; Classes of Attack; Don't Trip the Sensors: Integrate and Imitate; Vulnerability Remediation-Work Within the System; Incident Response - Putting Out Fires Without Getting Burned; Rooting: Show Me the Money!; Index; Related Titles |
Record Nr. | UNINA-9910450477203321 |
Bayles Aaron W | ||
Rockland, MA, : Syngress Publishing, c2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
InfoSec career hacking [[electronic resource] ] : sell your skillz, not your soul / / Aaron W. Bayles et al; forward by Christopher W. Klaus |
Autore | Bayles Aaron W |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2005 |
Descrizione fisica | 1 online resource (473 p.) |
Disciplina | 004.023 |
Altri autori (Persone) |
BrindleyEd
FosterJames C HurleyChris LongJohnny |
Soggetto topico |
Computer hackers
Computer security |
ISBN |
1-281-02028-1
9786611020286 0-08-048903-6 1-59749-043-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; Contents; Foreword; The Targets-What I Want to Be When I Grow Up (or at Least Get Older); Reconnaissance: Social Engineering for Profit; Enumerate: Determine What's Out There; First Strike: Basic Tactics for Successful Exploitation; The Laws of Security; No Place Like /home - Creating an Attack Lab; Vulnerability Disclosure; Classes of Attack; Don't Trip the Sensors: Integrate and Imitate; Vulnerability Remediation-Work Within the System; Incident Response - Putting Out Fires Without Getting Burned; Rooting: Show Me the Money!; Index; Related Titles |
Record Nr. | UNINA-9910783744403321 |
Bayles Aaron W | ||
Rockland, MA, : Syngress Publishing, c2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
InfoSec career hacking : sell your skillz, not your soul / / Aaron W. Bayles et al; forward by Christopher W. Klaus |
Autore | Bayles Aaron W |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2005 |
Descrizione fisica | 1 online resource (473 p.) |
Disciplina | 004.023 |
Altri autori (Persone) |
BrindleyEd
FosterJames C HurleyChris LongJohnny |
Soggetto topico |
Computer hackers
Computer security |
ISBN |
1-281-02028-1
9786611020286 0-08-048903-6 1-59749-043-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; Contents; Foreword; The Targets-What I Want to Be When I Grow Up (or at Least Get Older); Reconnaissance: Social Engineering for Profit; Enumerate: Determine What's Out There; First Strike: Basic Tactics for Successful Exploitation; The Laws of Security; No Place Like /home - Creating an Attack Lab; Vulnerability Disclosure; Classes of Attack; Don't Trip the Sensors: Integrate and Imitate; Vulnerability Remediation-Work Within the System; Incident Response - Putting Out Fires Without Getting Burned; Rooting: Show Me the Money!; Index; Related Titles |
Record Nr. | UNINA-9910817353603321 |
Bayles Aaron W | ||
Rockland, MA, : Syngress Publishing, c2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|