Wi-Fi Security
Stewart Miller
- 出版商: McGraw-Hill Education
- 出版日期: 2003-01-22
- 售價: $1,920
- 貴賓價: 9.5 折 $1,824
- 語言: 英文
- 頁數: 309
- 裝訂: Paperback
- ISBN: 0071410732
- ISBN-13: 9780071410731
-
相關分類:
Wi-Fi、資訊安全
下單後立即進貨 (約1週~2週)
買這商品的人也買了...
-
$980$833 -
$590$502 -
$680$578 -
$690$587 -
$420$328 -
$760$600 -
$590$466 -
$750$638 -
$560$476 -
$390$304 -
$490$417 -
$420$328 -
$720$612 -
$490$417 -
$650$553 -
$850$723 -
$860$731 -
$680$578 -
$620$484 -
$750$638 -
$490$382 -
$580$493 -
$780$663 -
$640$544 -
$290$226
相關主題
商品描述
Wireless technology offers businesses a world of strategic advantages —
and a host of security problems. But thanks to McGraw-Hill’s WiFi
Security, your company’s mission-critical data can be safeguarded, even
against hackers intent on exploiting vulnerabilities in your business’s network
brought on by wireless communications.
Written with insight by a leading wireless security expert, WiFi
Security:
* Deals explicitly with wireless security for Windows
2000/XP, MAC OS X, Linux, Lindows OS, Palm OS, and PocketPC platforms
*
Reviews security approaches for the different standards currently competing for
the U. S. market
* Addresses data compromise, unauthorized access, and
denial of service — all critical to WLAN users
* Covers the 802.11 IEEE
standard with regard to security, performance, and throughput
* Discusses
encryption and privacy through the Wireless Equivalent Privacy (WEP)
protocol
* And much, much more!
Contents
Chapter 1: Introduction to the Wireless LAN
Industry Security Standards
Chapter 2:
Technology
Chapter 3: Wireless LAN Security
Factors
Chapter 4: Issues in Wireless
Security
Chapter 5: The 802.11 Standard
Defined
Chapter 6: Wi-Fi Security
Infrastructure
Chapter 7: 802.11 Encryption: Wired
Equivalent
Chapter 8: Unauthorized Access &
Privacy
Chapter 9: Open System
Authentication
Chapter 10: Direct Sequence Spread
Spectrum
Chapter 11: Wi-Fi Equipment
Issues
Chapter 12: Cross-Platform Wireless User
Security
Chapter 13: Security Breach
Vulnerabilities
Chapter 14: Access Control
Schemes
Chapter 15: Wireless Laptop Users (PC &
Mac)
Chapter 16: Administrative
Security
Chapter 17: Security Issues for Wireless
Applications (Wireless PDAs)
Chapter 18: The Future of
Wi-Fi Security?
Index