Securing wireless LAN's

Securing wireless LAN's
Securing wireless LAN's
Wiley | ISBN: 0470851279 | 275 pages | 2.7 Mb | PDF
Wireless LANs are becoming ubiquitous. From hotel lobbies to Starbucks coffee shops, to airports and offices, it is difficult not to be able to pick up a wireless LAN signal. Accompanying the growth in the use of wireless LANs is a recognition that as initially designed they are not secure.
The focus of this book is upon wireless LAN security. In this book we will examine how wireless LANs operate, with special attention focused upon the manner in which security occurs under the IEEE 802.11 wireless LAN standard and its extensions, and why the standard and its extensions are weak. We will use this information to note many vulnerabilities associated with the use of wireless LANs and the security risks that can occur via an over-the-air
transmission method. Because network managers and LAN administrators, as well as small business and home users of wireless LANs, need to know how to overcome the security limitations of wireless LANs, several chapters in this book are devoted to security enhancement techniques. One chapter is focused upon vendor-specific solutions, while a second chapter examines the use of existing and evolving standards that can be employed to literally harden your wireless LAN.

Download link

[Fast Download] Securing wireless LAN's


Related eBooks:
Handbook of Mobile Data Privacy
Securing Applications on the Cloud
Gaining Access and Covering Your Tracks with Kali Linux
Internet of Things Security : Fundamentals, Techniques and Applications
Leveraging Advances in Social Network Thinking for National Security : Proceedings of a Workshop
Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementatio
Surviving the Rise of Cybercrime: A non-technical executive guide (Australia)
TOR: 2 in 1 Beginners Guidebook to TOR and Hacking - Access the Darknet
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS
Wireless Security and Cryptography: Specifications and Implementations
Adobe Premiere Pro CS6 Classroom in a Book
Policy-Driven Mobile Ad hoc Network Management
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.