Description |
xxvii, 555 pages : illustrations, maps ; 24 cm |
Contents |
Machine derived contents note: CHAPTER 1 Real World Wireless Security 1 -- CHAPTER 2 Under Siege 11 -- CHAPTER 3 Putting the Gear Together: 802.11 Hardware 23 -- CHAPTER 4 Making the Engine Run: 802.11 Drivers and Utilities 43 -- CHAPTER 5 Learning to WarDrive: Network Mapping and -- Site Surveying 71 -- CHAPTER 6 Assembling the Arsenal: Tools of the Trade 109 -- CHAPTER 7 Planning the Attack 143 -- CHAPTER 8 Breaking Through 155 -- CHAPTER 9 Looting and Pillaging: The Enemy Inside 199 -- CHAPTER 10 Building the Citadel: An Introduction to Wireless -- LAN Defense 221 -- CHAPTER 11 Introduction to Applied Cryptography: -- Symmetric Ciphers 253 -- CHAPTER 12 Cryptographic Data Integrity Protection, Key -- Exchange, and User Authentication Mechanisms 303 -- CHAPTER 13 The Fortress Gates: User Authentication in -- Wireless Security 323 -- CHAPTER 14 Guarding the Airwaves: Deploying Higher-Layer -- Wireless VPNs 383 -- CHAPTER 15 Counterintelligence: Wireless IDS Systems 435 |
Summary |
"Learn systematic countermeasures for building hardened wireless 'citadels' - including cryptography-based techniques, authentication, wireless VPNs, intrusion detection, and more." - cover |
Notes |
Includes index |
Bibliography |
Includes bibliographical references and index |
Subject |
Wireless LANs -- Security measures.
|
|
Computer networks -- Security measures.
|
|
Wireless communication systems.
|
Author |
Mikhailovsky, Andrei A.
|
|
Gavrilenko, Konstantin V.
|
LC no. |
2004105900 |
ISBN |
0321202171 |
|