Book description
The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!Communications engineers need to master a wide area of topics to excel. The Wireless Security Know It All covers every angle including Emerging Wireless Technologies and Security Issues, Wireless LAN and MAN Security, as well as Wireless Personal Area Networks.- A 360-degree view from our best-selling authors
- Topics include Today’s Wireless Technology, Security Definitions and Concepts, and Wireless Handheld devices
- The ultimate hard-working desk reference; all the essential information, techniques and tricks of the trade in one volume
Table of contents
- Brief Table of Contents
- Table of Contents
- Copyright Page
- About the Authors
-
Part I. Wireless Technology
- Chapter 1. Wireless Fundamentals
- Chapter 2. Wireless Network Logical Architecture
- Chapter 3. Wireless Network Physical Architecture
- Chapter 4. Radio Communication Basics
- Chapter 5. Infrared Communication Basics
- Chapter 6. Wireless LAN Standards
-
Chapter 7. Wireless Sensor Networks
- 7.1. Introduction to Wireless Sensor Networks
- 7.2. Individual Wireless Sensor Node Architecture
- 7.3. Wireless Sensor Networks Architecture
- 7.4. Radio Options for the Physical Layer in Wireless Sensor Networks
- 7.5. Power Consideration in Wireless Sensor Networks
- 7.6. Applications of Wireless Sensor Networks
- 7.7. Future Developments
-
Part II. Security Defi nitions and Concepts
- Chapter 8. Attacks and Risks
- Chapter 9. Security Defined
- Chapter 10. Standardizing Security
- Chapter 11. Secure Sockets Layer
- Chapter 12. Cryptography
- Chapter 13. Managing Access
- Chapter 14. Security and the Law
-
Chapter 15. Intrusion Process
- 15.1. Profiling To Select a Target or Gather Information
- 15.2. Social Engineering
- 15.3. Searching Publicly Available Resources
- 15.4. War-Driving, -Walking, -Flying, and -Chalking
- 15.5. Exploitable WLAN Configurations
- 15.6. How Intruders Obtain Network Access to a WLAN
- 15.7. Password Gathering and Cracking Software
- 15.8. Share Enumerators
- 15.9. Using Antennas and WLAN Equipment
- 15.10. Denial-of-Service Attacks and Tools
- 15.11. Rogue Devices as Exploitation Tools
- References
- Chapter 16. Security Policy
-
Part III. Wireless Network Security
- Chapter 17. Security in Traditional Wireless Networks
- Chapter 18. Wireless LAN Security
- Chapter 19. Security in Wireless Ad Hoc Networks
-
Chapter 20. Implementing Basic Wireless Security
- 20.1. Introduction
- 20.2. Enabling Security Features on a Linksys WAP11 802.11 b Access Point
- 20.3. Filtering by Media Access Control (MAC) Address
- 20.4. Enabling Security Features on a Linksys BEFW11 SR 802.11 b Access Point/Router
- 20.5. Enabling Security Features on a Linksys WRT54G 802.1 lb/g Access Point/Router
- 20.6. Enabling Security Features on a D-Link DI-624 AirPlus 2.4 GHz Xtreme G Wireless Router with 4-Port Switch
- 20.7. Configuring Security Features on Wireless Clients
- 20.8. Summary
- 20.9. Solutions Fast Track
-
Chapter 21. Implementing Advanced Wireless Security
- 21.1. Introduction
- 21.2. Implementing Wi-Fi Protected Access (WPA)
- 21.3. Implementing a Wireless Gateway with Reef Edge Dolphin
- 21.4. Implementing a VPN on a Linksys WRV54G VPN Broadband Router
- 21.5. Implementing RADIUS with Cisco LEAP
- 21.6. Understanding and Configuring 802.1X RADIUS Authentication
- 21.7. Summary
- 21.8. Solutions Fast Track
- Part IV. Other Wireless Technology
-
Appendix A. Wireless Policy Essentials
- A.1. Wireless position statement
- A.2. ABC Inc. InfoSec Risk Assessment Policy
- A.3. ABC Inc. InfoSec Audit Policy
- A.4. ABC Inc. InfoSec Acceptable Use Policy
- A.5. ABC Inc. InfoSec Network Policy
- A.6. ABC Inc. InfoSec De-Militarized Zone (DMZ) Policy
- A.7. ABC Inc. InfoSec Router Policy
- A.8. ABC Inc. InfoSec Extranet Policy
- A.9. ABC Inc. InfoSec Remote Access Policy
- A.10. ABC Inc. InfoSec Dial-In Access Policy
- A.11. ABC Inc. InfoSec VPN Communication Policy
- A.12. ABC Inc. InfoSec Wireless Communication Policy
- A.13. ABC Inc. InfoSec Server Policy
- A.14. ABC Inc. InfoSec Password Policy
- A.15. ABC Inc. InfoSec Application Password Policy
- A.16. ABC Inc. InfoSec Anti-Virus Policy
- A.17. ABC Inc. InfoSec Policy Exception Form
- B. Glossary
- Index
Product information
- Title: Wireless Security: Know It All
- Author(s):
- Release date: April 2011
- Publisher(s): Newnes
- ISBN: 9780080949673
You might also like
book
Maximum Wireless Security
Maximum Wireless Security is a practical handbook that reveals the techniques and tools crackers use to …
book
Wireless Hacks, 2nd Edition
The popularity of wireless networking has grown exponentially over the past few years, despite a general …
book
Ad Hoc Mobile Wireless Networks, 2nd Edition
Now in its second edition, this volume explains the concepts, mechanism, design, and performance of ad …
book
Wireless Communications Security
This book describes the current and most probable future wireless security solutions. The focus is on …