Wireless Security End to End
Brian Carter, Russell Shumway
- 出版商: Wiley
- 出版日期: 2002-09-05
- 售價: $1,407
- 貴賓價: 9.5 折 $1,337
- 語言: 英文
- 頁數: 360
- 裝訂: Paperback
- ISBN: 0764548867
- ISBN-13: 9780764548864
貴賓價: $1,671MCSE: Windows 2000 Directory Services Design Study Guide
貴賓價: $1,045Linux Kernel Development
貴賓價: $1,532802.11 Wireless Networks: The Definitive Guide
貴賓價: $1,200Extreme Programming Explained: Embrace Change
Wireless Security End to End is a comprehensive guide covering encryption,
PKI, SSL, third party certificate validation, Smart card, pin authentication,
device level security, threat analysis, strategies for developing a wireless
security solution and a look ahead at future biometric technology all in the End
to End series targeted at real-world professionals.
Wireless Security End to End is being done in the End to End series, a new series dedicated to cutting-edge technologies designed to provide proven solutions, real-world tips and best practices. The End to End series takes a no "techno-babble" modular approach in explaining cutting edge wireless technology. Special features include case studies, real-life implementations and wireless decision tree.
Table of Contents
Part I: Introduction to Wireless Network Security.
Chapter 1: Introduction to Wireless Networking.
Chapter 2: Wireless Threat Analysis.
Chapter 3: Behind the Threat.
Part II: Network Security Components.
Chapter 4: The Network Security Model.
Chapter 5: Network Intrusion Protection.
Chapter 6: Network Intrusion Detection.
Chapter 7: Host-Based Security.
Chapter 8: Virtual Private Networking.
Chapter 9: Event Correlation.
Part III: Wireless Security Components.
Chapter 10: Secure Configuration.
Chapter 11: Secure Authentication.
Chapter 12: Encryption.
Chapter 13: Wireless Device Placement.
Part IV: Integrating Wireless Access into the Network Security Process.
Chapter 14: Logging Wireless Events.
Chapter 15: Policy Issues.
Chapter 16: Assessing Wireless Network Security.
Chapter 17: Change Control and Device Administration.
Part V: Wireless Security Models.
Chapter 18: Cisco Implementation with LEAP.
Chapter 19: WLAN Authentication and Key Management with RADIUS.
Chapter 20: Wireless Access with IPSEC.
Chapter 21: Secure Wireless Public Access.
Chapter 22: Secure Wireless Point-to-Point Connectivity.
Appendix A: Glossary of Terms.
Appendix B: Web Site References.