Hack Proofing Your Wireless Network
Syngress, Eric Ouellet, Neal O'Farrell
- 出版商: Syngress
- 出版日期: 2002-02-28
- 售價: $199
- 語言: 英文
- 頁數: 512
- 裝訂: Paperback
- ISBN: 1928994598
- ISBN-13: 9781928994596
售價: $299CRM Automation
售價: $399SQL Queries for Mere Mortals: A Hands-On Guide to Data Manipulation in SQL (Paperback)
貴賓價: $983The Unofficial Guide to LEGO MINDSTORMS Robots (Paperback)
售價: $199Automated Forms Processing: A Primer : How to Capture Paper 2/e
售價: $299Broadband Fixed Wireless Networks
售價: $399High Technology Crime Investigator's Handbook
售價: $1,320How to Cheat at Securing Your Network
貴賓價: $1,771ISO 9001: 2000 For Small Businesses, 3/e (Paperback)
貴賓價: $1,575Designing Gestural Interfaces: Touchscreens and Interactive Devices (Paperback)
售價: $5Designing Web Interfaces: Principles and Patterns for Rich Interactions
售價: $299Working with Microsoft Dynamics CRM 4.0 (Paperback)
售價: $399Microsoft Dynamics CRM 4.0 Unleashed
售價: $480Microsoft Dynamics CRM 4.0 and Microsoft Dynamics Live CRM Step by Step
售價: $849Maximizing Your Sales with Microsoft Dynamics CRM
售價: $1,050Programming Microsoft Dynamics CRM 4.0
The Complete Guide to Protecting Your Wireless Network
Traditionally, someone had to be sitting in front of your computer to read your documents, see your e-mail, and play with your settings. Today, however, someone can be sitting in the office next door, a few floors up, or even in the next building, and have the same abilities as if he were in front of your computer. Are you using an 802.11 or Bluetooth device on your computer? Are you using a PDA to communicate with other systems or to get onto the Internet? Are you using a cellular phone to initiate a network connection back to your office? Have you just set up the latest wireless gateway at home? Are you planning on implementing a wireless solution in your office? Then you need Hack Proofing Your Wireless Network.
the Limitations of Wireless Security
Review how incomplete standards and changing protocols affect your networks.
2. Establish Information Classification Procedures
Learn the 7 steps to establishing a classification system, which provides the first step in the creation of your security standards and policies.
3. Understand the Broadcast Nature of Wireless
Learn about the most commonly used radio transmission protocols, including Frequency-Hopping Spread Spectrum (FHSS), Direct-Sequence Spread Spectrum (DRSS), and Infrared (IR).
4. Find Coverage of Sniffing, Interception, and Eavesdropping
Sniffing remains one of the most effective techniques in attacking a wireless network. Review sniffing and spoofing tools and protect against unauthorized attacks.
5. Design and Deploy a Secure Network
Review the WEP authentication process and it's advantages and disadvantages.
6. Think Like a Hacker
Understand how hackers choose the tools and equipment required for an attack and see how their techniques like "war driving" can be used against you.
7. Read about Intrusion Detection Strategies
Watch for unauthorized traffic and protocols and review popular monitoring products.
8. Design and Plan a Successful Audit
Learn the types of audits and best practices for auditing and security standards.
9. Develop a Wireless Security Checklist
Follow the steps to show what type of equipment and planning will be necessary.
10. Register for Your 1 Year Upgrade
The Syngress Solutions upgrade plan protects you from content obsolescence and provides monthly mailings, whitepapers, and more!
Eric Ouellet (CISSP)