Hack Proofing Your Wireless Network
Syngress, Eric Ouellet, Neal O'Farrell
- 出版商: Syngress Media
- 出版日期: 2002-04-21
- 定價: $1,580
- 售價: 1.9 折 $299
- 語言: 英文
- 頁數: 512
- 裝訂: Paperback
- ISBN: 1928994598
- ISBN-13: 9781928994596
-
相關分類:
802.11、Bluetooth、Wireless-networks
立即出貨(限量) (庫存=1)
買這商品的人也買了...
-
$1,110$1,055 -
$990SQL Queries for Mere Mortals: A Hands-On Guide to Data Manipulation in SQL (Paperback)
-
$199Automated Forms Processing: A Primer : How to Capture Paper 2/e
-
$680$612 -
$399Broadband Fixed Wireless Networks
-
$700CRM Automation
-
$2,000$1,900 -
$745High Technology Crime Investigator's Handbook
-
$320$272 -
$600$468 -
$399How to Cheat at Securing Your Network
-
$490$387 -
$2,040$1,938 -
$399Microsoft Dynamics CRM 4.0 Unleashed
-
$980$774 -
$350$298 -
$620$490 -
$1,360$1,292 -
$750$713 -
$880$836 -
$1,050Programming Microsoft Dynamics CRM 4.0
-
$2,110$2,005 -
$720$569 -
$825Designing Web Interfaces: Principles and Patterns for Rich Interactions
-
$500$395
相關主題
商品描述
The Complete Guide to Protecting Your Wireless Network
Traditionally, someone had to be sitting in front of your computer to read your documents, see your e-mail, and play with your settings. Today, however, someone can be sitting in the office next door, a few floors up, or even in the next building, and have the same abilities as if he were in front of your computer. Are you using an 802.11 or Bluetooth device on your computer? Are you using a PDA to communicate with other systems or to get onto the Internet? Are you using a cellular phone to initiate a network connection back to your office? Have you just set up the latest wireless gateway at home? Are you planning on implementing a wireless solution in your office? Then you need Hack Proofing Your Wireless Network.
1. Understand
the Limitations of Wireless Security
Review how incomplete standards and changing protocols affect your networks.
2. Establish Information Classification Procedures
Learn the 7 steps to establishing a classification system, which provides
the first step in the creation of your security standards and policies.
3. Understand the Broadcast Nature of Wireless
Learn about the most commonly used radio transmission protocols, including
Frequency-Hopping Spread Spectrum (FHSS), Direct-Sequence Spread Spectrum
(DRSS), and Infrared (IR).
4. Find Coverage of Sniffing, Interception, and Eavesdropping
Sniffing remains one of the most effective techniques in attacking a wireless
network. Review sniffing and spoofing tools and protect against unauthorized
attacks.
5. Design and Deploy a Secure Network
Review the WEP authentication process and it's advantages and disadvantages.
6. Think Like a Hacker
Understand how hackers choose the tools and equipment required for an
attack and see how their techniques like "war driving" can be
used against you.
7. Read about Intrusion Detection Strategies
Watch for unauthorized traffic and protocols and review popular monitoring
products.
8. Design and Plan a Successful Audit
Learn the types of audits and best practices for auditing and security
standards.
9. Develop a Wireless Security Checklist
Follow the steps to show what type of equipment and planning will be necessary.
10. Register for Your 1 Year Upgrade
The Syngress Solutions upgrade plan protects you from content obsolescence
and provides monthly mailings, whitepapers, and more!
Neal O'Farrell
Tony Bautts
Eric Ouellet (CISSP)