802. 11 Security : Securing Wireless Networks
802. 11 Security : Securing Wireless Networks
Click to enlarge
Author(s): Potter, Bruce
ISBN No.: 9780596002909
Pages: 192
Year: 200301
Format: Trade Paper
Price: $ 48.29
Dispatch delay: Dispatched between 7 to 15 days
Status: Available

Preface; Assumptions About the Reader; Scope of the Book; Conventions Used in This Book; Other Sources of Information; We'd Like to Hear from You; Acknowledgments;802.11 Security Basics; Chapter 1: A Wireless World; 1.1 What Is Wireless?; 1.2 Radio Transmission; 1.3 Inherent Insecurity; 1.4 802.11; 1.5 Structure of 802.


11 MAC; 1.6 WEP; 1.7 Problems with WEP; 1.8 Is It Hopeless?; Chapter 2: Attacks and Risks; 2.1 An Example Network; 2.2 Denial-of-Service Attacks; 2.3 Man-in-the-Middle Attacks; 2.4 Illicit Use; 2.


5 Wireless Risks; 2.6 Knowing Is Half the Battle;Station Security; Chapter 3: Station Security; 3.1 Client Security Goals; 3.2 Audit Logging; 3.3 Security Updates; Chapter 4: FreeBSD Station Security; 4.1 FreeBSD Client Setup; Chapter 5: Linux Station Security; 5.1 Linux Client Setup; 5.2 Kernel Configuration; 5.


3 OS Protection; 5.4 Audit Logging; 5.5 Secure Communication; Chapter 6: OpenBSD Station Security; 6.1 OpenBSD Client Setup; 6.2 Kernel Configuration; 6.3 OS Protection; 6.4 Audit Logging; Chapter 7: Mac OS X Station Security; 7.1 Mac OS X Setup; 7.


2 OS Protection; 7.3 Audit Logging; Chapter 8: Windows Station Security; 8.1 Windows Client Setup; 8.2 OS Protection; 8.3 Audit Logging; 8.4 Secure Communication;Access Point Security; Chapter 9: Setting Up an Access Point; 9.1 General Access Point Security; 9.2 Setting Up a Linux Access Point; 9.


3 Setting Up a FreeBSD Access Point; 9.4 Setting Up an OpenBSD Access Point; 9.5 Taking It to the Gateway;Gateway Security; Chapter 10: Gateway Security; 10.1 Gateway Architecture; 10.2 Secure Installation; 10.3 Firewall Rule Creation; 10.4 Audit Logging; Chapter 11: Building a Linux Gateway; 11.1 Laying Out the Network; 11.


2 Building the Gateway; 11.3 Configuring Network Interfaces; 11.4 Building the Firewall Rules; 11.5 MAC Address Filtering; 11.6 DHCP; 11.7 DNS; 11.8 Static ARP; 11.9 Audit Logging; 11.


10 Wrapping Up; Chapter 12: Building a FreeBSD Gateway; 12.1 Building the Gateway; 12.2 Building the Firewall Rules; 12.3 Rate Limiting; 12.4 DHCP; 12.5 DNS; 12.6 Static ARP; 12.7 Auditing; Chapter 13: Building an OpenBSD Gateway; 13.


1 Building the Gateway; 13.2 Building the Firewall Rules; 13.3 Rate Limiting; 13.4 DHCP; 13.5 DNS; 13.6 Static ARP; 13.7 Auditing; Chapter 14: Authentication and Encryption; 14.1 Portals; 14.


2 IPsec VPN; 14.3 802.1x; Chapter 15: Putting It All Together; 15.1 Pieces of a Coherent System; 15.2 User Knowledge; 15.3 Looking Ahead;Colophon;.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...