Practical, hands-on instruction for securing wireless networks Wireless Network Security: A Beginner's Guideis an implementation guide to the basics of wireless technologies: how to design and use today's technologies to add wireless capabilities into an existing LAN and ensure secure communications between users, wireless devices, and sensitive data while keeping budgets and security in the forefront. Featuring real-world scenarios and instruction from a veteran network administrator, this book shows you how to develop, implement, and maintain secure wireless networks. There are many established protocols and standards for communications and securityaexpert author Brock Pearson shows how to deploy them correctly for best security practices. Wireless Network Security: A Beginner's Guidefeatures: Chapter Objectives:List of topics covered in the chapter Prevention Techniques:Proactive process improvement measures for avoiding attacks and preventing vulnerabilities from emerging Hands-On Practice:Short, atry-it-yourselfa exercises in which the reader is led through a series of steps to create a simple program or event Ask the Security Guru:QaA sections filled with bonus information and helpful tips Checklists:A summary in checklist format at the end of each chapter that lists the important tasks discussed in the chapter On Budget:Highlighted sections help optimize and leverage existing security processes and technologies to align with budget needs. Real-world scenarios of implementations of wireless technologies into corporate environments Details on wireless technologies, including 802.11b, 802.11g, Bluetooth, long-range wireless, and WiFi Easy-to-follow coverage: Introduction to Wireless Networking; Existing Wireless Networking Protocols; Existing Wireless Security Algorithms; Building a Budget and Strategy for Wireless Capabilities; Wireless Strategies for Existing Environments; Wireless Strategies for New Environment; Tracking and Maintaining Budgets; Implementing Wireless Access into Existing Environments; Implementing Wireless Access into New Environments; Detecting Intrusions on Wireless Networks; Ensuring Secure Wireless/Wired Connections; Updating Wireless Access Point ConfigurationsSee DMZ (demilitarized zone) denial of service attacks, 67a69 design principles, defending against attacks, 137 detection ... dir (directory) command, 311 directional antennas parabolic, 32 yagi, 30a32 dirty data, 327 D-Link G730AP accessanbsp;...
|Title||:||Wireless Network Security A Beginner's Guide|
|Publisher||:||McGraw Hill Professional - 2012-04-30|