Wireless Security HandbookThe Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker. This wide scope benefits anyone who has to administer, secure, hack, or conduct business on a wireless network. This text tackles wirele |
Contents
1 | |
Risks and Threats of Wireless | 23 |
The Legality of Computer Crime | 43 |
Wireless Physical Layer Technologies | 49 |
Wireless Management Frames | 61 |
Wireless Local and Personal Area Networks | 75 |
Wide Area Wireless Technologies | 95 |
Wireless Antenna Theory | 111 |
Wireless End Devices | 169 |
Wireless LAN Security | 181 |
Breaking Wireless Security | 227 |
Wireless Security Policy | 253 |
Wireless Security Architectures | 269 |
Wireless Tools | 293 |
Review Question Answers | 325 |
349 | |
Other editions - View all
Common terms and phrases
ability access point allows amount antenna applied architecture attack authentication Bytes called cellular channel Chapter Cisco client communications companies connect cost created defined detail devices direction discussed document EAP type encryption equipment existing field Figure frame frequency function gateway identify IEEE increase inside installed Internet involved issues layer listed look means method mode modulation multiple needed Once operating packet password perform physical portion protect protocol radio RADIUS receiving request response risk scanner server signal similar single solution spectrum SSID standard started step survey take place technique threat tool traffic understand vendor wants wireless network