Apress

Guide to Wireless Network Security

By John R. Vacca

Guide to Wireless Network Security Cover Image

  • ISBN13: 978-0-3879-5425-7
  • 872 Pages
  • User Level: Science
  • Publication Date: October 16, 2006
  • Available eBook Formats: PDF
  • eBook Price: $143.00
Buy eBook Buy Print Book Add to Wishlist
Full Description
With the rapid deployment of wireless networks in business environments, IT professionals must implement security mechanisms that are equivalent to those existing today for wire-based networks. This volume is an authoritative, clearly-presented guide to key foundation topics and technology frameworks for designing and maintaining secure, reliable operations. From basic concepts to designing principles to deployment, all critical concepts and phases are explained in detail. The book also includes coverage of wireless security testing techniques and intrusion prevention techniques. Through extensive hands-on examples, Guide to Wireless Network Security demonstrates how to install, configure and troubleshoot firewalls and wireless network security applications; evaluate, implement and manage wireless secure remote access technologies; and deploy a variety of Virtual Private Networks, intrusion detection systems and intrusion prevention systems, in conjunction with information warfare countermeasures.
Table of Contents

Table of Contents

  1. Foreword Michael Erbschloe.
  2. Overview of Wireless Network Security (WN) Technology.
  3. Fundamentals.
  4. Types of Technology.
  5. Standards.
  6. Enhanced Security for Wireless LANS/WANS in Enterprise: Hands On.
  7. Private Info.
  8. Designing WN Security.
  9. Design Issues.
  10. Cost Justification.
  11. Standards Design Issues.
  12. Authenticating Architectural Design Issues.
  13. Planning.
  14. Plan Development.
  15. Planning Techniques.
  16. Installing/Deploying.
  17. Testing.
  18. Internetworking.
  19. Installation/Deployment.
  20. Securing Wireless E
  21. Commerce Storefront.
  22. Certification/Performance.
  23. Maintaining Security.
  24. Configuring Secure Access.
  25. Management Security.
  26. Ongoing Maintenance.
  27. Standards Development.
  28. Ensuring Site Security.
  29. Information Warfare Countermeasures: The Solution.
  30. Defensive Strategies for Governments and Industry Groups.
  31. Arsenal/Tactics of the Military, of Terrorists and Rogues, of Private Enterprises, of the Future.
  32. Civilian Casualties: Victims/Refugees of Info Warfare.
  33. Results and Future Directions.
  34. Solutions for ISP Intranet, Internet and E
  35. Commerce.
  36. Web Server Security.
  37. Solutions for Consideration.
  38. Recommendations.
  39. Appendices.
  40. Index.
Errata

If you think that you've found an error in this book, please let us know about it. You will find any confirmed erratum below, so you can check if your concern has already been addressed.

* Required Fields

No errata are currently published