Wireless LANs can be found nearly everywhere today. Most mobile computers ship with built-in wireless LAN hardware by default and most other computers can be equipped with additional hardware. Because all data is transmitted wirelessly, extra security is needed in these networks. This was a concern to the creators of the IEEE 802.11 standard, who designed a simple protocol called WEP which stands for Wired Equivalent Privacy to protect such networks. Unfortunately, the WEP protocol has some serious design flaws and various attacks are possible against WEP protected networks. This book presents nearly all currently known attacks on the WEP protocol, including their theoretical background and their implementation. This book is intended for network operators, who want to learn more about wireless security, and also for cryptographers, who want to understand the theoretical background of these attacks.
"synopsis" may belong to another edition of this title.
Erik Tews is working in the research group of Prof. Johannes Buchmann at TU-Darmstadt in the field of symmetric cryptography and applied cryptanalysis. Andreas Klein is working in the Department of Pure Mathematics and Computer Algebra in the field of cryptography, coding theory, and finite geometry at Gent University.
"About this title" may belong to another edition of this title.
Shipping:
US$ 50.00
From Germany to U.S.A.
Shipping:
US$ 3.99
Within U.S.A.
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
Condition: New. Seller Inventory # ABLIING23Mar3113020185788
Quantity: Over 20 available
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # IQ-9783639046380
Quantity: 15 available
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
PAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # IQ-9783639046380
Quantity: 15 available
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: NEW. PRINT ON DEMAND Book; New; Fast Shipping from the UK. No. book. Seller Inventory # ria9783639046380_lsuk
Quantity: Over 20 available
Seller: Chiron Media, Wallingford, United Kingdom
PF. Condition: NEW. Seller Inventory # 6666-IUK-9783639046380
Quantity: 10 available
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Wireless LANs can be found nearly everywhere today.Most mobile computersship with built-in wireless LAN hardware by defaultand most other computerscan be equipped with additional hardware.Because all data is transmitted wirelessly, extrasecurity is needed in thesenetworks.This was a concern to the creators of the IEEE802.11 standard, who designed a simple protocolcalled WEP which stands forWired Equivalent Privacy to protect such networks.Unfortunately, the WEP protocol has some seriousdesign flaws and various attacks are possible againstWEP protected networks. This book presents nearly allcurrently known attacks on the WEP protocol,including their theoretical background and theirimplementation. This book is intended for networkoperators, who want to learn more about wirelesssecurity, and also for cryptographers, who want tounderstand the theoretical background of these attacks. 136 pp. Englisch. Seller Inventory # 9783639046380
Quantity: 2 available
Seller: Buchpark, Trebbin, Germany
Condition: Sehr gut. Zustand: Sehr gut - Gepflegter, sauberer Zustand. Außen: Angestoßen. | Seiten: 136 | Sprache: Englisch | Produktart: Bücher. Seller Inventory # 4945452/2
Quantity: 1 available
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Wireless LANs can be found nearly everywhere today.Most mobile computersship with built-in wireless LAN hardware by defaultand most other computerscan be equipped with additional hardware.Because all data is transmitted wirelessly, extrasecurity is needed in thesenetworks.This was a concern to the creators of the IEEE802.11 standard, who designed a simple protocolcalled WEP which stands forWired Equivalent Privacy to protect such networks.Unfortunately, the WEP protocol has some seriousdesign flaws and various attacks are possible againstWEP protected networks. This book presents nearly allcurrently known attacks on the WEP protocol,including their theoretical background and theirimplementation. This book is intended for networkoperators, who want to learn more about wirelesssecurity, and also for cryptographers, who want tounderstand the theoretical background of these attacks. Seller Inventory # 9783639046380
Quantity: 2 available
Seller: moluna, Greven, Germany
Kartoniert / Broschiert. Condition: NEW. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Wireless LANs can be found nearly everywhere today.Most mobile computersship with built-in wireless LAN hardware by defaultand most other computerscan be equipped with additional hardware.Because all data is transmitted wireles. Seller Inventory # 4952403
Quantity: Over 20 available
Seller: Mispah books, Redhill, SURRE, United Kingdom
Paperback. Condition: USED_ASNEW. Like New. book. Seller Inventory # ERICA79036390463826
Quantity: 1 available