Warenkorb
Kostenloser Versand
Unsere Operationen sind klimaneutral

802 11 Security Bruce Potter

802 11 Security von Bruce Potter

802 11 Security Bruce Potter


40.00
Zustand - Sehr Gut
Nur noch 1

Zusammenfassung

This title shows readers how to secure 802.11 based wireless networks. Detailed coverage includes security issues unique to wireless networking, such as Wireless Access Points (WAP), bandwidth stealing, and the problematic Wired Equivalent Privacy component of 802.11.

802 11 Security Zusammenfassung

802 11 Security Bruce Potter

Mention wireless networks, and the question of security will soon follow. It's not surprising that in spite of compelling business arguments for going wireless, many companies are holding back because of security concerns. But, while it's true that wireless networks create security issues that don't exist in wired networks, the issues are not insurmountable. 802.11 Security shows how you can plan for and successfully contend with security obstacles in your wireless deployment. This authoritative book not only explains the security issues, but shows you how to design and build a your own secure wireless network. 802.11 Security covers the entire process of building secure 802.11-based wireless networks, in particular, the 802.11b (Wi-Fi) specification. The authors provide detailed coverage of security issues unique to wireless networking, such as Wireless Access Points (WAP), bandwidth stealing, and the problematic Wired Equivalent Privacy component of 802.11. You'll learn how to configure a wireless client and to set up a WAP using either Linux or Free BSD. You'll also find thorough information on controlling network access and encrypting client traffic. Beginning with an introduction to 802.11b in general, the book gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. Next, the book details the technical setup instructions needed for both the Linux and FreeBSD operating systems. Some of the topics covered include: Station Security for Linux, FreeBSD, Open BSD, Mac OS X and Windows; Setting Up Access Point Security Gateway Security, including building Gateways, firewall Rules, Auditing, etc.; Authentication and Encryption; FreeBSD IPsec client and gateway configuration; Linux IPsec client and gateway configuration; 802.1x authentication. 802.11 Security is a book whose time has come. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b-based systems, you'll want this book beside you every step of the way.

Über Bruce Potter

Bruce Potter is the Manager of Network and Security Operations for VeriSign's Mass Market's division. He manages the security for over a hundred network devices and several hundred servers. He's the founder of the Shmoo Group (www.shmoo.com), a web site for security, cryptography, and privacy professionals, and NoVAWireless (www.novawireless.org), a community-based wireless network project in Northern Virginia. Bob Fleck is a security researcher and the Director of Methodology Development at Secure Software, Inc. He has been involved in wireless networking both through the Northern Virginia community wireless group and through commercial security research into the topology of wireless networks. His recent work includes investigation of layer two attacks against wireless networking devices.

Inhaltsverzeichnis

Preface Part I. 802.11 Security Basics 1. A Wireless World What Is Wireless? Radio Transmission Inherent Insecurity 802.11 Structure of 802.11 MAC WEP Problems with WEP Is It Hopeless? 2. Attacks and Risks An Example Network Denial-of-Service Attacks Man-in-the-Middle Attacks Illicit Use Wireless Risks Knowing Is Half the Battle Part II. Station Security 3. Station Security Client Security Goals Audit Logging Security Updates 4. FreeBSD Station Security FreeBSD Client Setup 5. Linux Station Security Linux Client Setup Kernel Configuration OS Protection Audit Logging Secure Communication 6. OpenBSD Station Security OpenBSD Client Setup Kernel Configuration OS Protection Audit Logging 7. Mac OS X Station Security Mac OS X Setup OS Protection Audit Logging 8. Windows Station Security Windows Client Setup OS Protection Audit Logging Secure Communication Part III. Access Point Security 9. Setting Up an Access Point General Access Point Security Setting Up a Linux Access Point Setting Up a FreeBSD Access Point Setting Up an OpenBSD Access Point Taking It to the Gateway Part IV. Gateway Security 10. Gateway Security Gateway Architecture Secure Installation Firewall Rule Creation Audit Logging 11. Building a Linux Gateway Laying Out the Network Building the Gateway Configuring Network Interfaces Building the Firewall Rules AC Address Filtering DHCP DNS Static ARP Audit Logging Wrapping Up 12. Building a FreeBSD Gateway Building the Gateway Building the Firewall Rules Rate Limiting DHCP DNS Static ARP Auditing 13. Building an OpenBSD Gateway Building the Gateway Building the Firewall Rules Rate Limiting DHCP DNS Static ARP Auditing 14. Authentication and Encryption Portals IPsec VPN 802.1x 15. Putting It All Together Pieces of a Coherent System User Knowledge Looking Ahead Index

Zusätzliche Informationen

GOR003778279
9780596002909
0596002904
802 11 Security Bruce Potter
Gebraucht - Sehr Gut
Broschiert
O'Reilly Media
20030107
180
N/A
Die Abbildung des Buches dient nur Illustrationszwecken, die tatsächliche Bindung, das Cover und die Auflage können sich davon unterscheiden.
Dies ist ein gebrauchtes Buch. Es wurde schon einmal gelesen und weist von der früheren Nutzung Gebrauchsspuren auf. Wir gehen davon aus, dass es im Großen und Ganzen in einem sehr guten Zustand ist. Sollten Sie jedoch nicht vollständig zufrieden sein, setzen Sie sich bitte mit uns in Verbindung.