top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
How to cheat at securing a wireless network [[electronic resource] /] / Chris Hurley ... [et al.]
How to cheat at securing a wireless network [[electronic resource] /] / Chris Hurley ... [et al.]
Edizione [1st edition]
Pubbl/distr/stampa Rockland, Mass., : Syngress Media, c2006
Descrizione fisica 1 online resource (481 p.)
Disciplina 621.3845
Altri autori (Persone) HurleyChris
Collana How to Cheat
Soggetto topico Computer networks - Security measures
Wireless communication systems - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-281-07833-6
9786611078331
0-08-050822-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Securing a Wireless Network; Contents; Chapter 1. Introduction to Wireless: From Past to Present; Introduction; Exploring Past Discoveries That Led to Wireless; Exploring Present Applications for Wireless; Exploring This Book on Wireless; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Wireless Security; Introduction; Enabling Security Features on a Linksys WRT54G 802.11g Access Point; Enabling Security Features on a D-Link DI-624 AirPlus 2.4 GHz Xtreme G Wireless Router with Four-Port Switch; Enable Wi-Fi Protected Access
Enabling Security Features on Apple's Airport Extreme 802.11g Access PointEnabling Security Features on a Cisco 1100 Series Access Point; Enabling Security Features on Wireless Clients; Understanding and Configuring 802.1X RADIUS Authentication; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Dangers of Wireless Devices in the Workplace; Introduction; Intruders Accessing Legitimate Access Points; Intruders Connecting to Rogue Wireless Access Points; Intruders Connecting to WLAN Cards; Summary; Solutions Fast Track; Frequently Asked Questions
Chapter 4. WLAN Rogue Access Point Detection and MitigationIntroduction; The Problem with Rogue Access Points; Preventing and Detecting Rogue Access Points; IEEE 802.1x Port-based Security to Prevent Rogue Access Points; Using Catalyst Switch Filters to Limit MAC Addresses per Port; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Wireless LAN VLANs; Introduction; Understanding VLANs; VLANs in a Wireless Environment; Wireless VLAN Deployment; Configuring Wireless VLANs Using the IOS: A Case Study; Broadcast Domain Segmentation; Primary (Guest) and Secondary SSIDs
Using RADIUS for VLAN Access ControlSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Designing a Wireless Network; Introduction; Exploring the Design Process; Identifying the design methodology; Understanding Wireless Network Attributes from a Design Perspective; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Wireless Network Architecture and Design; Fixed Wireless Technologies; Developing WLANs through the 802.11 Architecture; Developing WPANs through the 802.15 Architecture; Mobile Wireless Technologies; Optical Wireless Technologies; Summary
Solutions Fast TrackFrequently Asked Questions; Chapter 8. Monitoring and Intrusion Detection; Introduction; Designing for Detection; Defensive Monitoring Considerations; Intrusion Detection Strategies; Conducting Vulnerability Assessments; Incident Response and Handling; Conducting Site Surveys for Rogue Access Points; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Designing a Wireless Enterprise Network: Hospital Case Study; Introduction; Introducing the Enterprise Case Study; Designing a Wireless Solution; Implementing and Testing the Wireless Solution
Lessons Learned
Altri titoli varianti Securing a wireless network
Record Nr. UNINA-9910450891203321
Rockland, Mass., : Syngress Media, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
How to cheat at securing a wireless network [[electronic resource] /] / Chris Hurley ... [et al.]
How to cheat at securing a wireless network [[electronic resource] /] / Chris Hurley ... [et al.]
Edizione [1st edition]
Pubbl/distr/stampa Rockland, Mass., : Syngress Media, c2006
Descrizione fisica 1 online resource (481 p.)
Disciplina 621.3845
Altri autori (Persone) HurleyChris
Collana How to Cheat
Soggetto topico Computer networks - Security measures
Wireless communication systems - Security measures
ISBN 1-281-07833-6
9786611078331
0-08-050822-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Securing a Wireless Network; Contents; Chapter 1. Introduction to Wireless: From Past to Present; Introduction; Exploring Past Discoveries That Led to Wireless; Exploring Present Applications for Wireless; Exploring This Book on Wireless; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Wireless Security; Introduction; Enabling Security Features on a Linksys WRT54G 802.11g Access Point; Enabling Security Features on a D-Link DI-624 AirPlus 2.4 GHz Xtreme G Wireless Router with Four-Port Switch; Enable Wi-Fi Protected Access
Enabling Security Features on Apple's Airport Extreme 802.11g Access PointEnabling Security Features on a Cisco 1100 Series Access Point; Enabling Security Features on Wireless Clients; Understanding and Configuring 802.1X RADIUS Authentication; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Dangers of Wireless Devices in the Workplace; Introduction; Intruders Accessing Legitimate Access Points; Intruders Connecting to Rogue Wireless Access Points; Intruders Connecting to WLAN Cards; Summary; Solutions Fast Track; Frequently Asked Questions
Chapter 4. WLAN Rogue Access Point Detection and MitigationIntroduction; The Problem with Rogue Access Points; Preventing and Detecting Rogue Access Points; IEEE 802.1x Port-based Security to Prevent Rogue Access Points; Using Catalyst Switch Filters to Limit MAC Addresses per Port; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Wireless LAN VLANs; Introduction; Understanding VLANs; VLANs in a Wireless Environment; Wireless VLAN Deployment; Configuring Wireless VLANs Using the IOS: A Case Study; Broadcast Domain Segmentation; Primary (Guest) and Secondary SSIDs
Using RADIUS for VLAN Access ControlSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Designing a Wireless Network; Introduction; Exploring the Design Process; Identifying the design methodology; Understanding Wireless Network Attributes from a Design Perspective; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Wireless Network Architecture and Design; Fixed Wireless Technologies; Developing WLANs through the 802.11 Architecture; Developing WPANs through the 802.15 Architecture; Mobile Wireless Technologies; Optical Wireless Technologies; Summary
Solutions Fast TrackFrequently Asked Questions; Chapter 8. Monitoring and Intrusion Detection; Introduction; Designing for Detection; Defensive Monitoring Considerations; Intrusion Detection Strategies; Conducting Vulnerability Assessments; Incident Response and Handling; Conducting Site Surveys for Rogue Access Points; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Designing a Wireless Enterprise Network: Hospital Case Study; Introduction; Introducing the Enterprise Case Study; Designing a Wireless Solution; Implementing and Testing the Wireless Solution
Lessons Learned
Altri titoli varianti Securing a wireless network
Record Nr. UNINA-9910784271603321
Rockland, Mass., : Syngress Media, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
How to cheat at securing a wireless network / / Chris Hurley ... [et al.]
How to cheat at securing a wireless network / / Chris Hurley ... [et al.]
Edizione [1st edition]
Pubbl/distr/stampa Rockland, Mass., : Syngress Media, c2006
Descrizione fisica 1 online resource (481 p.)
Disciplina 621.3845
Altri autori (Persone) HurleyChris
Collana How to Cheat
Soggetto topico Computer networks - Security measures
Wireless communication systems - Security measures
ISBN 9786611078331
9781281078339
1281078336
9780080508221
0080508227
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Securing a Wireless Network; Contents; Chapter 1. Introduction to Wireless: From Past to Present; Introduction; Exploring Past Discoveries That Led to Wireless; Exploring Present Applications for Wireless; Exploring This Book on Wireless; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Wireless Security; Introduction; Enabling Security Features on a Linksys WRT54G 802.11g Access Point; Enabling Security Features on a D-Link DI-624 AirPlus 2.4 GHz Xtreme G Wireless Router with Four-Port Switch; Enable Wi-Fi Protected Access
Enabling Security Features on Apple's Airport Extreme 802.11g Access PointEnabling Security Features on a Cisco 1100 Series Access Point; Enabling Security Features on Wireless Clients; Understanding and Configuring 802.1X RADIUS Authentication; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Dangers of Wireless Devices in the Workplace; Introduction; Intruders Accessing Legitimate Access Points; Intruders Connecting to Rogue Wireless Access Points; Intruders Connecting to WLAN Cards; Summary; Solutions Fast Track; Frequently Asked Questions
Chapter 4. WLAN Rogue Access Point Detection and MitigationIntroduction; The Problem with Rogue Access Points; Preventing and Detecting Rogue Access Points; IEEE 802.1x Port-based Security to Prevent Rogue Access Points; Using Catalyst Switch Filters to Limit MAC Addresses per Port; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Wireless LAN VLANs; Introduction; Understanding VLANs; VLANs in a Wireless Environment; Wireless VLAN Deployment; Configuring Wireless VLANs Using the IOS: A Case Study; Broadcast Domain Segmentation; Primary (Guest) and Secondary SSIDs
Using RADIUS for VLAN Access ControlSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Designing a Wireless Network; Introduction; Exploring the Design Process; Identifying the design methodology; Understanding Wireless Network Attributes from a Design Perspective; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Wireless Network Architecture and Design; Fixed Wireless Technologies; Developing WLANs through the 802.11 Architecture; Developing WPANs through the 802.15 Architecture; Mobile Wireless Technologies; Optical Wireless Technologies; Summary
Solutions Fast TrackFrequently Asked Questions; Chapter 8. Monitoring and Intrusion Detection; Introduction; Designing for Detection; Defensive Monitoring Considerations; Intrusion Detection Strategies; Conducting Vulnerability Assessments; Incident Response and Handling; Conducting Site Surveys for Rogue Access Points; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Designing a Wireless Enterprise Network: Hospital Case Study; Introduction; Introducing the Enterprise Case Study; Designing a Wireless Solution; Implementing and Testing the Wireless Solution
Lessons Learned
Altri titoli varianti Securing a wireless network
Record Nr. UNINA-9910823417103321
Rockland, Mass., : Syngress Media, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui