Flylib.com
Caution! Wireless Networking: Preventing a Data Disaster
Caution! Wireless Networking: Preventing a Data Disaster
ISBN: 076457213X
EAN: 2147483647
Year: 2003
Pages: 145
Authors:
Jack McCullough
BUY ON AMAZON
Table of Contents
BackCover
Caution Wireless Networking--Preventing a Data Disaster
Introduction
How This Book Is Organized
Part I: Understanding the Threat
Chapter 1: A Brief Overview of Wi-Fi
Introducing Wi-Fi
Examining Wi-Fi Equipment
Equipment Worth Avoiding
Demystifying Wireless Standards
Introducing Organizations and Certification
Summary
Chapter 2: Network Fundamentals and Security Concerns
Explaining Networking Terms
Examining Network Models
Demystifying the TCPIP Protocols
Understanding Network Addresses and Names
Connecting Networks
Summary
Chapter 3: The People Behind the Problem
Separating Hackers from Crackers
Visiting the Underground Cracker Culture
What Makes Hackers and Crackers Tick
Hacker Conventions and Gatherings
Examining Crackers Tricks
Entertaining HackingCracking Resources
Summary
Chapter 4: Hijacking Wi-Fi
Hijacking Sessions
Understanding Rogue Access Points
Uncovering Denial of Service Attacks
Summary
Chapter 5: More Wireless Attacks
Attacking Hosts
Sniffing the Network
Summary
Chapter 6: Wardriving
Introducing Wardriving
Warchalking
Warspying
Software for Defense
More About Wardriving
Summary
Chapter 7: Viruses and Wi-Fi
Understanding Malicious Software
Examining Computer Viruses
Exposing Trojan Programs
Discovering Internet Worms
Discovering Blended Threats
Bot Software
Introducing Spyware
Investigating Viruses on Handhelds
Understanding the Hoax Problem
Summary
Part II: Protecting Yourself
Chapter 8: Technical Pitfalls and Solutions
Discovering Common Wi-Fi Problems
Detecting and Dealing with Interference
Defining Interoperability Issues
Learning About Antennas
Optimizing Equipment
Summary
Chapter 9: Wireless Privacy Concerns
Why Privacy Matters
Wi-Fi Privacy Threats
Demystifying Privacy Policies
Other Vulnerable Wireless Technology
Summary
Chapter 10: Encryption and Wi-Fi
Introducing Encryption
Understanding Modern Encryption Techniques
Debunking Wired Equivalent Privacy (WEP)
Investigating Wi-Fi Protected Access (WPA)
Introducing Pretty Good Privacy (PGP)
Summary
Chapter 11: Securing Your WLAN
Understanding WLAN Vulnerabilities
Changing Dangerous Default Settings
Understanding DHCP
Filtering Network Traffic
Modifying Broadcast Parameters
Using Encryption
Securing Clients and Hosts
Summary
Chapter 12: Protecting Your Wi-Fi Data
Identifying Threats to Wireless Data
Choosing backup systems
Protecting Your Hardware
Summary
Appendix A: Suppliers, Manufacturers, and Resources
Wi-Fi Resources
Security, Privacy, and Antivirus Resources
PDA, PC, and Accessory Manufacturers
Software
Appendix B: Wireless Standards
802.11a
802.11g
802.11c
802.11d
802.11e
802.11f
802.11h
802.11i
802.11 IR
802.11n
802.16a and WiMAX
Bluetooth and 802.15.1
802.15.4 and ZigBee
802.15.3 and WiMedia
HiperLAN
Glossary
A-F
G-L
M-R
S-W
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
List of Sidebars
Caution! Wireless Networking: Preventing a Data Disaster
ISBN: 076457213X
EAN: 2147483647
Year: 2003
Pages: 145
Authors:
Jack McCullough
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Testing for No Records
Dynamically Creating Crystal Reports
Using ADO.NET Design-Time Features in Classes Without a GUI
Formatting Column Values When Outputting Data as XML
Enumerating and Maintaining Database Objects
A+ Fast Pass
Domain 3 Preventive Maintenance
Domain 4 Motherboard/Processors/Memory
Domain 5 Printers
Domain 2 Installation, Configuration, and Upgrading
Domain 3 Diagnosing and Troubleshooting
Cisco CallManager Fundamentals (2nd Edition)
Enterprise Deployment of CallManager Clusters
Call Routing
Call Hunting Constructs
Identifying CDR Data Generated for Each Call Type
SIP Signaling
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Voice of the Customer (VOC)
Descriptive Statistics and Data Displays
Identifying and Verifying Causes
Complexity Value Stream Mapping and Complexity Analysis
Selecting and Testing Solutions
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Troubleshooting a Home Network
Installing a Home Lighting Control System
Designing and Installing a Home Telephone System
Troubleshooting a Home Communication System
Appendix A Home Technology Project Management
The Oracle Hackers Handbook: Hacking and Defending Oracle
The Oracle Network Architecture
Attacking the Authentication Process
Triggers
Accessing the File System
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies