Wireless Network Security

ISBN-10: 0071760946

ISBN-13: 9780071760942

Edition: 2012

Authors: Brock Pearson, Tyler Wrightson

List price: $33.99 Buy it from $5.99
eBook available
30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy


Practical, hands-on instruction for securing wireless networks Wireless Network Security: A Beginner's Guideis an implementation guide to the basics of wireless technologies: how to design and use today's technologies to add wireless capabilities into an existing LAN and ensure secure communications between users, wireless devices, and sensitive data while keeping budgets and security in the forefront. Featuring real-world scenarios and instruction from a veteran network administrator, this book shows you how to develop, implement, and maintain secure wireless networks. There are many established protocols and standards for communications and securityexpert author Brock Pearson shows how to deploy them correctly for best security practices. Wireless Network Security: A Beginner's Guidefeatures: Chapter Objectives:List of topics covered in the chapter Prevention Techniques:Proactive process improvement measures for avoiding attacks and preventing vulnerabilities from emerging Hands-On Practice:Short, "try-it-yourself" exercises in which the reader is led through a series of steps to create a simple program or event Ask the Security Guru:Q&A sections filled with bonus information and helpful tips Checklists:A summary in checklist format at the end of each chapter that lists the important tasks discussed in the chapter On Budget:Highlighted sections help optimize and leverage existing security processes and technologies to align with budget needs. Real-world scenarios of implementations of wireless technologies into corporate environments Details on wireless technologies, including 802.11b, 802.11g, Bluetooth, long-range wireless, and WiFi Easy-to-follow coverage: Introduction to Wireless Networking; Existing Wireless Networking Protocols; Existing Wireless Security Algorithms; Building a Budget and Strategy for Wireless Capabilities; Wireless Strategies for Existing Environments; Wireless Strategies for New Environment; Tracking and Maintaining Budgets; Implementing Wireless Access into Existing Environments; Implementing Wireless Access into New Environments; Detecting Intrusions on Wireless Networks; Ensuring Secure Wireless/Wired Connections; Updating Wireless Access Point Configurations
New Starting from $31.37
eBooks Starting from $42.00
Buy eBooks
what's this?
Rush Rewards U
Members Receive:
You have reached 400 XP and carrot coins. That is the daily max!
Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS Word® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS PowerPoint® 2010 Online content $4.95 $1.99
Customers also bought

Book details

List price: $33.99
Copyright year: 2012
Publisher: McGraw-Hill Education
Publication date: 8/1/2012
Binding: Paperback
Pages: 368
Size: 6.00" wide x 9.00" long x 1.00" tall
Weight: 1.298
Language: English

Brock Pearson (CISSP, CRISC) is an information technology and security consultant, instructor, and author and technical editor of books and curricula. He has provided his security technical expertise performing technical editing services on Security+, SIEM, and SSCP books and for computer-based training videos.

Tyler Wrightson, CISSP, CCSP, CCNA, CCDA, MCSE, is the founder and president of Leet Systems, a next-generation security service provider, and Frigdo.com, a free online events search engine. He is currently a seniorsecurity consultant for Integralis, Inc., where he specializes in offensive security engagements and penetration testing. Follow Tyler's security blog at http://blog.leetsys.com or follow him on twitter @tbwrightson.

Wireless Foundations
Introduction to the Wireless Security Mindset
What You Will Learn
Security 101: The 11 Security Principles
Principle 1: Security Versus Convenience
Principle 2: It Is Impossible to Eliminate All Risks
Principle 3: Rules of Risk Calculation and Mitigating Controls
Principle 4: Not All Risks Must Be Mitigated
Principle 5: Security Is Not Just Keeping the Bad Guys Out
Principle 6: ROI Doesn't Work for Security
Principle 7: Defense In Depth
Principle 8: Least Privilege
Principle 9: CIA Triad
Principle 10: Prevention, Detection, Deterrents
Principle 11: Prevention Fails
Wireless Networking Basics
Access Points
Autonomous vs. Controller Based
Beacons and Broadcasts
Associating and Authenticating
Wireless Tools and Gadgets
A Lab of Your Own
Client Devices
Access Points
Apple Airport Express
Mini Access Points
Mobile Hotspots
Enterprise-Grade Access Points
Types of Antennas
Smartphones and PDAs
Pocket Wireless Scanners
Spectrum Analyzer
Operating System of Choice
Know Thy Enemy
Theory of Attacks on Wireless Networks
Setting the Stage
Wireless Reconnaissance
SSID Decloaking
Passive Packet Captures
Store and Crack at Your Convenience
Man-in-the-Middle Attacks
MTTM-OK, Now What?
WEP Authentication
Stream Ciphers vs. Block Ciphers
How WEP Works
History of Breaking WEP
Attacking WEP Encrypted Networks
How WPA Works
WPA2 Encryption Algorithms
Attacking WPA Protected Networks
So What Should I Use?
Attacking Wireless Networks
Wireless Reconnaissance
The iwlist Command
Actively Attacking Wireless Networks
Cracking WEP Encryption
Cracking a WPA Passphrase
Attacking Wireless Clients
Wireless World
Wireless Client Vulnerabilities
Factors That Exacerbate Wireless Client Vulnerabilities
Wireless Reconnaissance
Sniffing Insecure Communications
Capturing Packets
Can We Force the Client to Talk to Us?
Creating a Linux Access Point
Forcing the Client to Talk to Us
Default Operations
Man-in-the-Middle Attacks
DNS Spoofing
Fake Webauth
SSL Stripping
Fake AV Updates
Real-World Wireless Security Defenses
Theory of Defense for Securing Wireless Networks
Setting the Stage
The Attacker Has the Advantage
Phases of Wireless Deployment
New Deployments
Existing Wireless Networks
Wireless Refresh
Secure Design Principles for Wireless Networks
Defense In Depth
Least Privilege
Network Segmentation
Wireless Assessments
Secure the Infrastructure
Rogue AP Detection
Physical Security
Change the Default Configurations
Due Diligence
Confidentiality Integrity Availability (CIA)
Useless Defenses
Faraday Cage
MAC Filtering
SSID Cloaking
WEP Cloaking
Good Wireless Defenses
Intrusion Detection Systems and Intrusion Prevention Systems
Wireless Intrusion Detection and Intrusion Prevention Systems
Web Authentication Gateways
Understanding the WPA2-Enterprise with Certificates Architecture
Introduction to WPA2-Enterprise with Digital Certificates
Public Key Infrastructure and Digital Certificates
Public Key Cryptography: Asymmetric Encryption Algorithms
Digital Certificates
Microsoft Certificate Services
Remote Authentication Dial-In User Service
802. 1x: Port-Based Access Control
RADIUS and 802.1x
WPA Enterprise Architecture
Deploying a WPA-Enterprise Network with Certificates
Install and Configure the Certification Authority
Install Active Directory Certificate Services
Configure the Certificate Template and Auto-Enrollment
Allow Pre-logon Authentication
Configure the RADIUS Server
Configure the Wireless Access Point
Authenticate to the Wireless Network
Deploying Secure Wireless Networks
WPA2-Enterprise Wireless Networks
Configure the Network Policy Server (RADIUS)
Configure the Wireless Access Point
Configure the Wireless Client
Troubleshooting PEAP Authentication
Troubleshooting RADIUS Authentication
Securing Your Wireless Network
Segmenting Wireless Networks
Restricting Users
Restricting Time
Restricting Network Subnets and TCP Ports
Handling Wireless Guest Access
Guest Networks and Internet Access
Authenticating Guest Users and Managing Guest Credentials
Using Captive Web Portals
Guest Users Only
Encrypting Traffic
Using Auto-Expiring Credentials
Allowing Secure Access to Internal Resources
Authenticating Consultants
Segmenting Guest Wireless Networks from Internal Networks
DMZ with Jump Stations
Virtual Private Networking
Handling Rogue Access Points and the Future of Wireless Security
Handling Rogue Access Points
Preventing Rogue Wireless Networks
Manually Detecting Rogue Wireless Networks
Tracing Malicious Rogue Access Points
Handling Rogue Access Points
Automated Detection of Rogue Wireless Networks
Other Wireless Technologies
Next-Gen Solutions
Lightweight Wireless Solutions
Cloud-based Wireless Solutions
Dedicated Wireless IDS
Client Protection
User Education
Technical Solutions for Endpoint Security
Group Policy Objects
A Introduction to Linux: The Wireless Engineer's Operating System of Choice
The Linux Operating System
BackTrack: Our Linux Distribution of Choice
Downloading and Burning BackTrack
Booting BackTrack from a USB Drive
Booting to BackTrack
The Gnome Graphical Environment
Basic Linux Commands
Understanding the Linux Shell
Running Commands
Getting Help with Linux Commands
Navigating the Linux File System
Installing Software on BackTrack
Basic User Administration
Basic Networking Configuration
Understanding Linux File Permissions
Basic Scripting
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.