»
How to Cheat at Securing a Wireless Network
 
 

How to Cheat at Securing a Wireless Network, 1st Edition

 
How to Cheat at Securing a Wireless Network, 1st Edition,Chris Hurley,Lee Barken,ISBN9781597490870
 
 
 

  &      

Syngress

9781597490870

9780080508221

500

229 X 178

Print Book

Paperback

In Stock

Estimated Delivery Time
USD 41.95

eBook
eBook Overview

VST format:

DRM Free included formats: PDF

This product is currently not available.
 
 

Key Features

· A practical product and technology specific guideline to securing a wireless networks for the busy System Administrator
· Takes a simplified multi-layered approach into easily deployed plans for a straight forward understanding
· Does not bog you down with history, but offers practical useful information for today

Description

Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless network

With the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006.

With this increase in usage comes a commensurate increase in the network’s vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users.

Readership

Network administrator and Security administrators who need to secure wireless networks.

Chris Hurley

Chris Hurley is a Senior Penetration Tester in the Washington, DC area. He has more than 10 years of experience performing penetration testing, vulnerability assessments, and general INFOSEC grunt work. He is the founder of the WorldWide WarDrive, a four-year project to assess the security posture of wireless networks deployed throughout the world. Chris was also the original organizer of the DEF CON WarDriving contest. He is the lead author of WarDriving: Drive, Detect, Defend (Syngress Publishing, ISBN: 19318360305). He has contributed to several other Syngress publications, including Penetration Tester's Open Source Toolkit (ISBN: 1-5974490210), Stealing the Network: How to Own an Identity (ISBN: 1597490067), InfoSec Career Hacking (ISBN: 1597490113), and OS X for Hackers at Heart (ISBN: 1597490407). He has a BS from Angelo State University in Computer Science and a whole bunch of certifications to make himself feel important.

Affiliations and Expertise

Chris Hurley is a Senior Penetration Tester in the Washington, DC area. He has more than 10 years of experience performing penetration testing, vulnerability assessments, and general INFOSEC grunt work. He is the founder of the WorldWide WarDrive, a four-year project to assess the security posture of wireless networks deployed throughout the world. Chris was also the original organizer of the DEF CON WarDriving contest. He is the lead author of WarDriving: Drive, Detect, Defend (Syngress Publishing, ISBN: 19318360305). He has contributed to several other Syngress publications, including Penetration Tester's Open Source Toolkit (ISBN: 1-5974490210), Stealing the Network: How to Own an Identity (ISBN: 1597490067), InfoSec Career Hacking (ISBN: 1597490113), and OS X for Hackers at Heart (ISBN: 1597490407). He has a BS from Angelo State University in Computer Science and a whole bunch of certifications to make himself feel important.

View additional works by Chris Hurley

Lee Barken

Affiliations and Expertise

co-director of the Strategic Technologies And Research (STAR) Center, San Diego State University, U.S.A.

How to Cheat at Securing a Wireless Network, 1st Edition

1: Introduction to Wireless: From Past to Present
2: Wireless Security
3: Dangers of Wireless Devices in the Workplace
4: WLAN Rogue Access Point Detection and Mitigation
5: Wireless LAN VLANs
6: Wireless Network Architecture and Design
7: Wireless Network Architecture and Design
8: Monitoring and Intrusion Detection
9: Case Study: Designing a Wireless Enterprise Network
10: Case Study: Designing a Wireless Industrial Network
11: Designing a Personal Wireless Network: Home Office Case Study
12: Wireless Penetration Testing
13:Appendix A: Solutions Fast Track
 
 
Discount on all Earth,Environment and Energy Titles | Use Promo Code EARTH
Shop with Confidence

Free Shipping around the world
▪ Broad range of products
▪ 30 days return policy
FAQ