Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Bautts T., Ouellet E., O'Farrell N. — Hack Proofing Your Wireless Network
Bautts T., Ouellet E., O'Farrell N. — Hack Proofing Your Wireless Network



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Hack Proofing Your Wireless Network

Авторы: Bautts T., Ouellet E., O'Farrell N.

Аннотация:

With the arrival of IEEE 802.11b (a.k.a. WiFi) and other wireless networking technologies on the market comes a wave of stories about snoops intercepting sensitive LAN traffic from out in the company parking lot or across the concourse at the airport. Hack Proofing Your Wireless Network takes a look at strategies for defending wireless LANs — those based on Bluetooth and IEEE 802.11a as well as WiFi — against signal interception and other attacks peculiar to their wireless nature. Unfortunately, there's also a lot of background information on WiFi (as well as on security principles in general), and this is related to wireless network security only tangentially. Though this material represents unneeded padding, the bulk of the book is made up of useful information about security strategies and defensive configuration. There's also a fair bit of information about the security characteristics of some top-selling wireless networking products.

In a section on choosing WiFi access points, the authors give a very explicit list of requirements (the ability to disable service-set identifier broadcasts, 128-bit Wired Equivalent Protocol — WEP — and so on), and list at least three real products (by make and model) that fit the specifications. They then proceed to show how to choose the most secure configuration options on each of the featured products, including the Cisco Systems Aironet and the Agere ORiNOCO. Configuration instructions are easy to follow and illustrated in detail. Information on the offensive side of the equation is shallower — the authors point out that it's possible to drive around, looking for unsecured wireless access points and that WEP has security flaws. Still, this book is one of the first on security for wireless networks, and it provides a lot of good information to the administrators of such networks.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Неизвестно

ed2k: ed2k stats

Год издания: 2002

Количество страниц: 512

Добавлена в каталог: 12.11.2006

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте