Flylib.com
Caution! Wireless Networking: Preventing a Data Disaster
Caution! Wireless Networking: Preventing a Data Disaster
ISBN: 076457213X
EAN: 2147483647
Year: 2003
Pages: 145
Authors:
Jack McCullough
BUY ON AMAZON
Table of Contents
BackCover
Caution Wireless Networking--Preventing a Data Disaster
Introduction
How This Book Is Organized
Part I: Understanding the Threat
Chapter 1: A Brief Overview of Wi-Fi
Introducing Wi-Fi
Examining Wi-Fi Equipment
Equipment Worth Avoiding
Demystifying Wireless Standards
Introducing Organizations and Certification
Summary
Chapter 2: Network Fundamentals and Security Concerns
Explaining Networking Terms
Examining Network Models
Demystifying the TCPIP Protocols
Understanding Network Addresses and Names
Connecting Networks
Summary
Chapter 3: The People Behind the Problem
Separating Hackers from Crackers
Visiting the Underground Cracker Culture
What Makes Hackers and Crackers Tick
Hacker Conventions and Gatherings
Examining Crackers Tricks
Entertaining HackingCracking Resources
Summary
Chapter 4: Hijacking Wi-Fi
Hijacking Sessions
Understanding Rogue Access Points
Uncovering Denial of Service Attacks
Summary
Chapter 5: More Wireless Attacks
Attacking Hosts
Sniffing the Network
Summary
Chapter 6: Wardriving
Introducing Wardriving
Warchalking
Warspying
Software for Defense
More About Wardriving
Summary
Chapter 7: Viruses and Wi-Fi
Understanding Malicious Software
Examining Computer Viruses
Exposing Trojan Programs
Discovering Internet Worms
Discovering Blended Threats
Bot Software
Introducing Spyware
Investigating Viruses on Handhelds
Understanding the Hoax Problem
Summary
Part II: Protecting Yourself
Chapter 8: Technical Pitfalls and Solutions
Discovering Common Wi-Fi Problems
Detecting and Dealing with Interference
Defining Interoperability Issues
Learning About Antennas
Optimizing Equipment
Summary
Chapter 9: Wireless Privacy Concerns
Why Privacy Matters
Wi-Fi Privacy Threats
Demystifying Privacy Policies
Other Vulnerable Wireless Technology
Summary
Chapter 10: Encryption and Wi-Fi
Introducing Encryption
Understanding Modern Encryption Techniques
Debunking Wired Equivalent Privacy (WEP)
Investigating Wi-Fi Protected Access (WPA)
Introducing Pretty Good Privacy (PGP)
Summary
Chapter 11: Securing Your WLAN
Understanding WLAN Vulnerabilities
Changing Dangerous Default Settings
Understanding DHCP
Filtering Network Traffic
Modifying Broadcast Parameters
Using Encryption
Securing Clients and Hosts
Summary
Chapter 12: Protecting Your Wi-Fi Data
Identifying Threats to Wireless Data
Choosing backup systems
Protecting Your Hardware
Summary
Appendix A: Suppliers, Manufacturers, and Resources
Wi-Fi Resources
Security, Privacy, and Antivirus Resources
PDA, PC, and Accessory Manufacturers
Software
Appendix B: Wireless Standards
802.11a
802.11g
802.11c
802.11d
802.11e
802.11f
802.11h
802.11i
802.11 IR
802.11n
802.16a and WiMAX
Bluetooth and 802.15.1
802.15.4 and ZigBee
802.15.3 and WiMedia
HiperLAN
Glossary
A-F
G-L
M-R
S-W
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
List of Sidebars
Caution! Wireless Networking: Preventing a Data Disaster
ISBN: 076457213X
EAN: 2147483647
Year: 2003
Pages: 145
Authors:
Jack McCullough
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.2 Install SSH Windows Clients to Access Remote Machines Securely
Step 3.2 Use PuTTY / plink as a Command Line Replacement for telnet / rlogin
Step 4.1 Authentication with Public Keys
Step 4.6 How to use PuTTY Passphrase Agents
Step 5.1 General Troubleshooting
CISSP Exam Cram 2
LAW, INVESTIGATIONS, AND ETHICS
Penetration Testing
Exam Prep Questions
Answers to Exam Prep Questions
Practice Exam 1
Certified Ethical Hacker Exam Prep
Determining Assessment Scope
Key Terms
Apply Your Knowledge
SQL Injection
Certified Ethical Hacker
Managing Enterprise Systems with the Windows Script Host
Networking Resources
Input/Output Streams
Registry Operations
Messaging Operations
System Administration
Competency-Based Human Resource Management
Why a Focus on Jobs Is Not Enough
A Need for Implementing Competency-Based HR Management
Competency-Based Employee Training
The Transformation to Competency-Based HR Management
Appendix D Employee Development and Succession Management
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter One Solutions
Chapter Three Sales Process
Chapter Thirteen Closing: Reaching Final Agreement
Chapter Fifteen Sales Management System: Managers Managing Pipelines and Salespeople
Appendix B Solution Selling: A Scalable Approach
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies