O'Reilly logo

Wireless Network Security: A Beginner’s Guide by Tyler Wrightson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index

Symbols
image
| (pipe), running Linux commands and
Numbers
image
11 security principles. See security principles
32-bit, BackTrack versions
40-bit WEP
64-bit, BackTrack versions
104-bit WEP
802.1q (trunking protocol)
802.1x (port-based access control)
adding authenticators for wireless network
applying authentication to wireless networks
authentication using
captive portals compared with
configuring authentication settings
installing RADIUS server and
overview of
preventing rogue wireless networks
RADIUS and
reconfiguration as troubleshooting approach ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required