Wireless Security End to End

Brian Carter, Russell Shumway

  • 出版商: Hungry Minds
  • 出版日期: 2002-08-22
  • 售價: $1,300
  • 貴賓價: 9.5$1,235
  • 語言: 英文
  • 頁數: 360
  • 裝訂: Paperback
  • ISBN: 0764548867
  • ISBN-13: 9780764548864
  • 相關分類: 資訊安全
  • 下單後立即進貨 (約1~3週)




Wireless Security End to End is a comprehensive guide covering encryption, PKI, SSL, third party certificate validation, Smart card, pin authentication, device level security, threat analysis, strategies for developing a wireless security solution and a look ahead at future biometric technology all in the End to End series targeted at real-world professionals.
Wireless Security End to End is being done in the End to End series, a new series dedicated to cutting-edge technologies designed to provide proven solutions, real-world tips and best practices. The End to End series takes a no "techno-babble" modular approach in explaining cutting edge wireless technology. Special features include case studies, real-life implementations and wireless decision tree.

Table of Contents


Part I: Introduction to Wireless Network Security.

Chapter 1: Introduction to Wireless Networking.

Chapter 2: Wireless Threat Analysis.

Chapter 3: Behind the Threat.

Part II: Network Security Components.

Chapter 4: The Network Security Model.

Chapter 5: Network Intrusion Protection.

Chapter 6: Network Intrusion Detection.

Chapter 7: Host-Based Security.

Chapter 8: Virtual Private Networking.

Chapter 9: Event Correlation.

Part III: Wireless Security Components.

Chapter 10: Secure Configuration.

Chapter 11: Secure Authentication.

Chapter 12: Encryption.

Chapter 13: Wireless Device Placement.

Part IV: Integrating Wireless Access into the Network Security Process.

Chapter 14: Logging Wireless Events.

Chapter 15: Policy Issues.

Chapter 16: Assessing Wireless Network Security.

Chapter 17: Change Control and Device Administration.

Part V: Wireless Security Models.

Chapter 18: Cisco Implementation with LEAP.

Chapter 19: WLAN Authentication and Key Management with RADIUS.

Chapter 20: Wireless Access with IPSEC.

Chapter 21: Secure Wireless Public Access.

Chapter 22: Secure Wireless Point-to-Point Connectivity.

Appendix A: Glossary of Terms.

Appendix B: Web Site References.