Save 40% on eBooks sitewide until 4/15/15
The Apress April Fools' Day Special Promotion

Guide to Wireless Network Security

By John R. Vacca

  • eBook Price: $129.00 $77.40
Buy eBook Buy Print Book Add to Wishlist

Guide to Wireless Network Security Cover Image

  • ISBN13: 978-0-3879-5425-7
  • 872 Pages
  • User Level: Science
  • Publication Date: October 16, 2006
  • Available eBook Formats: PDF

Related Titles

Full Description
With the rapid deployment of wireless networks in business environments, IT professionals must implement security mechanisms that are equivalent to those existing today for wire-based networks. This volume is an authoritative, clearly-presented guide to key foundation topics and technology frameworks for designing and maintaining secure, reliable operations. From basic concepts to designing principles to deployment, all critical concepts and phases are explained in detail. The book also includes coverage of wireless security testing techniques and intrusion prevention techniques. Through extensive hands-on examples, Guide to Wireless Network Security demonstrates how to install, configure and troubleshoot firewalls and wireless network security applications; evaluate, implement and manage wireless secure remote access technologies; and deploy a variety of Virtual Private Networks, intrusion detection systems and intrusion prevention systems, in conjunction with information warfare countermeasures.
Table of Contents

Table of Contents

  1. Foreword Michael Erbschloe.
  2. Overview of Wireless Network Security (WN) Technology.
  3. Fundamentals.
  4. Types of Technology.
  5. Standards.
  6. Enhanced Security for Wireless LANS/WANS in Enterprise: Hands On.
  7. Private Info.
  8. Designing WN Security.
  9. Design Issues.
  10. Cost Justification.
  11. Standards Design Issues.
  12. Authenticating Architectural Design Issues.
  13. Planning.
  14. Plan Development.
  15. Planning Techniques.
  16. Installing/Deploying.
  17. Testing.
  18. Internetworking.
  19. Installation/Deployment.
  20. Securing Wireless E
  21. Commerce Storefront.
  22. Certification/Performance.
  23. Maintaining Security.
  24. Configuring Secure Access.
  25. Management Security.
  26. Ongoing Maintenance.
  27. Standards Development.
  28. Ensuring Site Security.
  29. Information Warfare Countermeasures: The Solution.
  30. Defensive Strategies for Governments and Industry Groups.
  31. Arsenal/Tactics of the Military, of Terrorists and Rogues, of Private Enterprises, of the Future.
  32. Civilian Casualties: Victims/Refugees of Info Warfare.
  33. Results and Future Directions.
  34. Solutions for ISP Intranet, Internet and E
  35. Commerce.
  36. Web Server Security.
  37. Solutions for Consideration.
  38. Recommendations.
  39. Appendices.
  40. Index.

Please Login to submit errata.

No errata are currently published