How to Cheat at Securing a Wireless Network

How to Cheat at Securing a Wireless Network
ISBN-10
0080508227
ISBN-13
9780080508221
Category
Computers
Pages
500
Language
English
Published
2006-08-22
Publisher
Elsevier
Authors
Lee Barken, Chris Hurley

Description

Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless network With the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the network’s vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users. · A practical product and technology specific guideline to securing a wireless networks for the busy System Administrator · Takes a simplified multi-layered approach into easily deployed plans for a straight forward understanding · Does not bog you down with history, but offers practical useful information for today

Similar books

  • How to Cheat at Securing a Wireless Network
    By Chris Hurley

    How to Cheat at Securing a Wireless Network

  • How to Cheat at Securing Your Network
    By Ido Dubrawsky

    The latest addition to the best selling "How to Cheat..." series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, ...

  • How to Cheat at Microsoft Vista Administration
    By Jan Kanclirz

    In the book you will: * Automate Windows Vista Installation See how Windows installations can be automated for large-scale deployments using the Windows Automated Installation Kit (WAIK). * Install and Maintain Devices Windows Vista ...

  • How to Cheat at Designing Security for a Windows Server 2003 Network
    By Chris Peiris, Chris Ruston

    The application pool will manage the resources of the Web site. HTTP. ... This will only suit a small set of users. ... Windows Server 2003 comes with Internet Connection Firewall (ICF) to facilitate small to medium-sized organizations.

  • Microsoft Forefront Security Administration Guide
    By Jesse Varsalone

    Jan has contributed to the following Syngress book titles either as a technical editor or author: Managing and Securing Cisco SWAN, Practical VoIP Security, How to Cheat at Securing a Wireless Network, Microsoft Vista for IT Security ...

  • The Real MCTS/MCITP Exam 70-620 Prep Kit: Independent and Complete Self-Paced Solutions
    By Anthony Piltzecker

    ... System and How to Cheat at Managing Microsoft Operations Manager 2005, is an independent consultant based in Boston, MA.Tony's specialties include network security design, Microsoft operating system and applications architecture, ...

  • Microsoft Vista for IT Security Professionals
    By Anthony Piltzecker

    Systems Management Server (SMS) 2003 is the current version of the Microsoft enterprise-level configuration monitoring software. SMS was designed to be the powerhouse Microsoft product for managing network clients, and it accomplishes ...

  • How to Cheat at Deploying and Securing RFID
    By Frank Thornton, Paul Sanghera

    Wireless local area network (WLAN) technologies provide the networking and physical layers of a traditional LAN using radio frequencies. WLAN nodes generally transmit and receive digital data to and from common wireless access points ...

  • How to Cheat at Managing Windows Small Business Server 2003: In the Land of the Blind, the One-Eyed Man is...
    By Susan Snedaker

    In this chapter, you learned the basics of disk management from terminology to concepts to step-by-step ... you have data on the drives and want to convert back, you must back up your data, convert back to basic and restore your data.

  • Netcat Power Tools
    By Jan Kanclirz

    Jan Kanclirz Jr. (CCIE #12136-Security, CCSP, CCNP, CCIP, CCNA, CCDA, INFOSEC Professional, ... to several Syngress book titles: Managing and Securing Cisco SWAN, Practical VoIP Security, and How to Cheat at Securing a Wireless Network.