Skip to content

802. 11 Security Securing Wireless Networks

Best in textbook rentals since 2012!

ISBN-10: 0596002904

ISBN-13: 9780596002909

Edition: 2002

Authors: Bruce Potter, Bob Fleck

List price: $34.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Mention wireless networks, and the question of security will soon follow. It's not surprising that in spite of compelling business arguments for going wireless, many companies are holding back because of security concerns. But, while it's true that wireless networks create security issues that don't exist in wired networks, the issues are not insurmountable. "802.11 Security shows how you can plan for and successfully contend with security obstacles in your wireless deployment. This authoritative book not only explains the security issues, but shows you how to design and build a your own secure wireless network. "802.11 Security covers the entire process of building secure 802.11-based…    
Customers also bought

Book details

List price: $34.99
Copyright year: 2002
Publisher: O'Reilly Media, Incorporated
Publication date: 1/7/2003
Binding: Paperback
Pages: 192
Size: 6.97" wide x 9.33" long x 0.44" tall
Weight: 0.814
Language: English

is a security researcher and the Director of Methodology Development at Secure Software, Inc. He has been involved in wireless networking both through the Northern Virginia community wireless group and through commercial security research into the topology of wireless networks. His recent work includes investigation of layer two attacks against wireless networking devices.

Preface
802.11 Security Basics
A Wireless World
What Is Wireless?
Radio Transmission
Inherent Insecurity
802.11
Structure of 802.11 MAC
WEP
Problems with WEP
Is It Hopeless?
Attacks and Risks
An Example Network
Denial-of-Service Attacks
Man-in-the-Middle Attacks
Illicit Use
Wireless Risks
Knowing Is Half the Battle
Station Security
Station Security
Client Security Goals
Audit Logging
Security Updates
FreeBSD Station Security
FreeBSD Client Setup
Linux Station Security
Linux Client Setup
Kernel Configuration
OS Protection
Audit Logging
Secure Communication
OpenBSD Station Security
OpenBSD Client Setup
Kernel Configuration
OS Protection
Audit Logging
Mac OS X Station Security
Mac OS X Setup
OS Protection
Audit Logging
Windows Station Security
Windows Client Setup
OS Protection
Audit Logging
Secure Communication
Access Point Security
Setting Up an Access Point
General Access Point Security
Setting Up a Linux Access Point
Setting Up a FreeBSD Access Point
Setting Up an OpenBSD Access Point
Taking It to the Gateway
Gateway Security
Gateway Security
Gateway Architecture
Secure Installation
Firewall Rule Creation
Audit Logging
Building a Linux Gateway
Laying Out the Network
Building the Gateway
Configuring Network Interfaces
Building the Firewall Rules
MAC Address Filtering
DHCP
DNS
Static ARP
Audit Logging
Wrapping Up
Building a FreeBSD Gateway
Building the Gateway
Building the Firewall Rules
Rate Limiting
DHCP
DNS
Static ARP
Auditing
Building an OpenBSD Gateway
Building the Gateway
Building the Firewall Rules
Rate Limiting
DHCP
DNS
Static ARP
Auditing
Authentication and Encryption
Portals
IPsec VPN
802.1x
Putting It All Together
Pieces of a Coherent System
User Knowledge
Looking Ahead
Index