How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN

0 avg rating
( 0 ratings by GoodReads )
 
9780131402065: How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN

The results of a new study from IDC offer a strong thumbs-up to the fast-evolving information security services sector, predicting that the market for such services will increase to more than $23.5 billion in the next four years. Demand for security for wireless networks will drive the growth of the information security services market. Announcements by major companies (i.e. Intel, Dell, Gateway, IBM) backing wireless technologies are setting the stage for wide-scale deployments and the ushering in a new era of wireless freedom.The bottom line is that wireless is here to stay. The integration of 802.11 into almost all new laptops, coupled with the explosion in availability of public hotspots has created a cycle of large scale wireless proliferation. This invisible, yet inescapable flood of radio waves has landed squarely in our homes and businesses where it presents a new security challenge. How do we embrace the joys of wireless networks while we maintain an essential balance with the security needs of our organization? This book is all about understanding the technology, recognizing the security risks, and implementing a responsible and realistic game plan for safe and secure wireless communication.

"synopsis" may belong to another edition of this title.

From the Back Cover:

Now you can have the awesome benefits of wireless LANswithout falling victim to their notorious security flaws. Leadingwireless security expert Lee Barken shows you practicalworkarounds and fixes for the vulnerabilities in today'sWLANs, introduces high-security wireless protocols new to themarketplace, and offers step-by-step instructions for protectingall your wireless information, from the home to the enterprise.This is the definitive and easy-to-use WLAN security book you'vebeen searching for--whether you're a network administrator,security specialist, manager, or home user.

Topics covered include--
  • Why conventional wireless LANs are so insecure--and what you can do about it
  • "Wardriving" software, equipment, and techniques: knowing your enemy
  • 802.11i, WPA, TKIP, and AES: the new wireless security options
  • 802.1x and EAP: enabling port-based authentication on your WLAN
  • Safely connecting WLANs to wired networks
  • Securing home and small office environments, one step at a time
  • Accessing VPNs from wireless devices
  • Integrating firewalls and wireless access points
  • Improving security in public access environments
  • Securing enterprise environments with 802.1x--a start-to-finish walkthrough

About the Author:

About the Author

LEE BARKEN, CISSP, CCNA, MCP, CPA, has been in the IT industry since 1987. He has worked as anIT consultant and network security specialist for Ernst and Young's Information Technology RiskManagement (ITRM) practice and KPMG's Risk and Advisory Services (RAS) practice. He co-foundedthe San Diego Wireless Users Group and writes and speaks on the topic of wireless LANtechnology and security. He is the technical editor for Mobile Business Advisor Magazine, andteaches Wireless LAN Security and Deployment classes for the University of California at SanDiego (UCSD) extension.

"About this title" may belong to another edition of this title.

Top Search Results from the AbeBooks Marketplace

1.

Barken, Lee
Published by Prentice Hall
ISBN 10: 0131402064 ISBN 13: 9780131402065
New Quantity Available: > 20
Seller
INDOO
(Avenel, NJ, U.S.A.)
Rating
[?]

Book Description Prentice Hall. Book Condition: New. Brand New. Bookseller Inventory # 0131402064

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 20.75
Convert Currency

Add to Basket

Shipping: US$ 3.50
Within U.S.A.
Destination, Rates & Speeds

2.

Barken, Lee
Published by Prentice Hall (2003)
ISBN 10: 0131402064 ISBN 13: 9780131402065
New Softcover Quantity Available: > 20
Seller
Palexbooks
(Sanford, NC, U.S.A.)
Rating
[?]

Book Description Prentice Hall, 2003. Book Condition: New. Brand new! Please provide a physical shipping address. Bookseller Inventory # 9780131402065

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 44.44
Convert Currency

Add to Basket

Shipping: US$ 3.00
Within U.S.A.
Destination, Rates & Speeds

3.

Barken, Lee
Published by Prentice Hall (2003)
ISBN 10: 0131402064 ISBN 13: 9780131402065
New Paperback Quantity Available: 1
Seller
Irish Booksellers
(Rumford, ME, U.S.A.)
Rating
[?]

Book Description Prentice Hall, 2003. Paperback. Book Condition: New. book. Bookseller Inventory # 0131402064

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 50.74
Convert Currency

Add to Basket

Shipping: FREE
Within U.S.A.
Destination, Rates & Speeds

4.

Barken, Lee
Published by Prentice Hall (2003)
ISBN 10: 0131402064 ISBN 13: 9780131402065
New Paperback Quantity Available: 1
Seller
Ergodebooks
(RICHMOND, TX, U.S.A.)
Rating
[?]

Book Description Prentice Hall, 2003. Paperback. Book Condition: New. 1. Bookseller Inventory # DADAX0131402064

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 50.72
Convert Currency

Add to Basket

Shipping: US$ 3.99
Within U.S.A.
Destination, Rates & Speeds

5.

Barken, Lee
Published by Prentice Hall PTR (2003)
ISBN 10: 0131402064 ISBN 13: 9780131402065
New Paperback Quantity Available: 1
Seller
Revaluation Books
(Exeter, United Kingdom)
Rating
[?]

Book Description Prentice Hall PTR, 2003. Paperback. Book Condition: Brand New. 1st edition. 224 pages. 9.00x6.75x0.50 inches. In Stock. Bookseller Inventory # zk0131402064

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 47.71
Convert Currency

Add to Basket

Shipping: US$ 7.43
From United Kingdom to U.S.A.
Destination, Rates & Speeds

6.

Barken, Lee
ISBN 10: 0131402064 ISBN 13: 9780131402065
New Quantity Available: 1
Seller
Castle Rock
(Pittsford, NY, U.S.A.)
Rating
[?]

Book Description Book Condition: Brand New. Book Condition: Brand New. Bookseller Inventory # 97801314020651.0

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 65.60
Convert Currency

Add to Basket

Shipping: US$ 3.99
Within U.S.A.
Destination, Rates & Speeds

7.

Barken, Lee
Published by Prentice Hall (2003)
ISBN 10: 0131402064 ISBN 13: 9780131402065
New Softcover Quantity Available: 1
Seller
Book Deals
(Lewiston, NY, U.S.A.)
Rating
[?]

Book Description Prentice Hall, 2003. Book Condition: New. Brand New, Unread Copy in Perfect Condition. A+ Customer Service! Summary: (NOTE:Each chapter begins with an Introduction and concludes with a Summary.) Foreword. Introduction. 1. The Need For Wireless LAN Security. Security in Layers. Size Matters-What Are You Protecting? Wireless LAN 101. Shared Key Authentication. Wi-Fi Protected Access (WPA). Beware: The Walls are Listeninghellip; Stop the RF Bleeding. 2. Introduction to WLAN. Pre-802.11. 802.11 (1997). Spread Spectrum. 801.11b. Interoperability. Critical Mass. 802.11a. 802.11g. Other Working Groups. 802.11 Specification. A Tale of Two Topologies. CSMA/CA. RTS/CTS. Fragmentation. 3. WEP Vulnerabilities-Wired Equivalent Privacy? WEP 101. Decrypting the WEP Message. Key Management Problems. RC4 Stream Cipher. IV Collisions. Message Injection. Authentication Spoofing. Brute Force Attacks. Cracking WEP Keys. Now What? 4. War Driving: Tools and Techniques. What Is War Driving? Wireless Sniffers. Putting It All Together. Ethical Considerations. War Chalking. 5. 802.11I, WPA, TKIP, AND AES. WPA to the Rescue! TKIP. WPA for the Home. 802.11i and AES. 6. 802.1x Explained. Where Did 802.1x Come From? Guilty Until Proven Innocent (or Authenticated). 802.1x Authentication Conversation. Solving Security Problems with 802.1x. But Wait, There's More! Competing Standards. 7. Connecting a WLAN to the Wired Network. Assessing the Information Assets. A Layered Approach. Multiple SSIDs. 802.1x vs. VPN. Hands-on Projects. 8. How to Deploy a VPN for Wireless Environments. PPTP vs. L2TP/IPSec. PPTP: Point-to-Point Tunneling Protocol. L2TP: Layer 2 Tunneling Protocol with IPSec. Choosing an Authentication Protocol. Building a VPN Server. Configuring the VPN Server. Configuring Clients. The Downside to VPNs. 9. How to Secure and Manage a Home Environment. Basic Security Steps. Beyond Security: Managing the Network. AP on Steroids? Linux Embedded Appliance Firewall (LEAF). Adding Wireless Client Support to Bering. Sputnik around the World. ReefEdge Dolphin. 10. How to Secure an Enterprise Environment. 802.1x Revisited. Setting Up the Authentication Server. Configuring the CA. Configuring the Authenticator. Using EAP-TLS with Windows 2000 Server. 11. Setting Up a Secure Public Hotspot: Building A Linux-Based Access Point. HostAP Prism Driver for Linux. NoCat. The 800-Pound Pebble. LEAF to the Rescue. Troubleshooting Tips. Appendix A: Introduction to RF. The History of Radio Frequency. Electromagnetism. Induction. Conduction. Radio Waves. Structure of a Wave. Modulation. Attenuation. Antennae. How Antennae Work. Different Kinds of Antennae. Antenna Types. Summary. Appendix B: 802.11 Frame Types. Management Frames. Control Frames. Data Frames. Appendix C: Community Wireless Networking. For Pay. Amenity. Utility. User Groups. The Mission. The Legal Issues. Sentre Partners in San Diego. Software Options for Free Hotspots. The Big Picture. Appendix D: Building a Pringles Can Antenna. Index. Bookseller Inventory # ABE_book_new_0131402064

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 95.27
Convert Currency

Add to Basket

Shipping: FREE
Within U.S.A.
Destination, Rates & Speeds