April 2009
Intermediate to advanced
765 pages
19h 26m
English
IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:
Wireless attacks
Rogue wireless devices
Peer-to-peer attacks
Eavesdropping
Encryption cracking
Authentication attacks
MAC spoofing
Management interface exploits
Wireless hijacking
Denial of service (DoS)
Vendor-specific attacks
Social engineering
Intrusion monitoring
Wireless intrusion detection system (WIDS)
Wireless intrusion prevention system (WIPS)
Mobile WIDS
Spectrum analyzer
Wireless security policy
General security policy
Functional security policy
Legislative compliance
802.11 wireless policy recommendations

As you have learned throughout ...