Security Smarts for the Self-Guided IT Professional Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and explains how to identify and prevent them. Actual cases of attacks against WEP, WPA, and wireless clients and their defenses are included. This practical resource reveals how intruders exploit vulnerabilities and gain access to wireless networks. You'll learn how to securely deploy WPA2 wireless networks, including WPA2-Enterprise…mehr
Security Smarts for the Self-Guided IT Professional Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and explains how to identify and prevent them. Actual cases of attacks against WEP, WPA, and wireless clients and their defenses are included. This practical resource reveals how intruders exploit vulnerabilities and gain access to wireless networks. You'll learn how to securely deploy WPA2 wireless networks, including WPA2-Enterprise using digital certificates forauthentication. The book provides techniques for dealing with wireless guest access and rogue access points. Next-generation wireless networking technologies, such as lightweight access points and cloud-based wirelesssolutions, are also discussed. Templates, checklists, and examples give you the hands-on help you need to get started right away. Wireless Network Security: A Beginner's Guide features: Lingo--Common security terms defined so that you'rein the know on the job IMHO--Frank and relevant opinions based on theauthor's years of industry experience In Actual Practice--Exceptions to the rules of securityexplained in real-world contexts Your Plan--Customizable checklists you can use onthe job now Into Action--Tips on how, why, and when to applynew skills and techniques at work This is an excellent introduction to wireless security and their security implications. The technologies and tools are clearly presented with copious illustrations and the level of presentation will accommodate the wireless security neophyte while not boring a mid-level expert to tears. If the reader invests the time and resources in building a lab to follow along with the text, s/he will develop a solid, basic understanding of what "wireless security" is and how it can be implemented in practice. This is definitely a recommended read for its intended audience. - Richard Austin, IEEE CIPHER, IEEE Computer Society's TC on Security and Privacy (E109, July 23, 2012)Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Tyler Wrightson is the author of Advanced Persistent Threats and Wireless Network Security: A Beginner's Guide. Tyler is the founder and president of Leet Systems, which provides offensive security services such as Penetration Testing and Red Teaming to secure organizations against real world attackers. Tyler has over twelve years experience in the IT security field with extensive experience in all forms of offensive security and penetration testing. Tyler holds industry certifications for CISSP, CCSP, CCNA, CCDA, and MCSE. Tyler has also taught classes for CCNA certification, wireless security, and network security. He has been a frequent speaker at industry conferences including Derbycon, BSides, Rochester Security Summit, ISACA, ISSA, and others. Follow his security blog at http://blog.leetsys.com.
Inhaltsangabe
Part I: Wireless Foundations Chapter 1. Introduction to the Wireless Security Mindset Chapter 2. Wireless Tools and Gadgets Part II: Know Thy Enemy Chapter 3. Theory of Attacks on Wireless Networks Chapter 4. Attacking Wireless Networks Chapter 5. Attacking Wireless Clients Part III: Real-World Wireless Security Defenses Chapter 6. Theory of Defense for Securing Wireless Networks Chapter 7. Understanding the WPA2-Enterprise with Certificates Architecture Chapter 8. Deploying a WPA-Enterprise Network with Certificates Chapter 9. Deploying Secure Wireless Networks Chapter 10. Handling Wireless Guest Access Chapter 11. Handling Rogue Access Points and the Future of Wireless Security Appendix A: Introduction to Linux: The Wireless Engineer's Operating System of Choice
Part I: Wireless Foundations Chapter 1. Introduction to the Wireless Security Mindset Chapter 2. Wireless Tools and Gadgets Part II: Know Thy Enemy Chapter 3. Theory of Attacks on Wireless Networks Chapter 4. Attacking Wireless Networks Chapter 5. Attacking Wireless Clients Part III: Real-World Wireless Security Defenses Chapter 6. Theory of Defense for Securing Wireless Networks Chapter 7. Understanding the WPA2-Enterprise with Certificates Architecture Chapter 8. Deploying a WPA-Enterprise Network with Certificates Chapter 9. Deploying Secure Wireless Networks Chapter 10. Handling Wireless Guest Access Chapter 11. Handling Rogue Access Points and the Future of Wireless Security Appendix A: Introduction to Linux: The Wireless Engineer's Operating System of Choice
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497