Flylib.com
Caution! Wireless Networking: Preventing a Data Disaster
Caution! Wireless Networking: Preventing a Data Disaster
ISBN: 076457213X
EAN: 2147483647
Year: 2003
Pages: 145
Authors:
Jack McCullough
BUY ON AMAZON
Table of Contents
BackCover
Caution Wireless Networking--Preventing a Data Disaster
Introduction
How This Book Is Organized
Part I: Understanding the Threat
Chapter 1: A Brief Overview of Wi-Fi
Introducing Wi-Fi
Examining Wi-Fi Equipment
Equipment Worth Avoiding
Demystifying Wireless Standards
Introducing Organizations and Certification
Summary
Chapter 2: Network Fundamentals and Security Concerns
Explaining Networking Terms
Examining Network Models
Demystifying the TCPIP Protocols
Understanding Network Addresses and Names
Connecting Networks
Summary
Chapter 3: The People Behind the Problem
Separating Hackers from Crackers
Visiting the Underground Cracker Culture
What Makes Hackers and Crackers Tick
Hacker Conventions and Gatherings
Examining Crackers Tricks
Entertaining HackingCracking Resources
Summary
Chapter 4: Hijacking Wi-Fi
Hijacking Sessions
Understanding Rogue Access Points
Uncovering Denial of Service Attacks
Summary
Chapter 5: More Wireless Attacks
Attacking Hosts
Sniffing the Network
Summary
Chapter 6: Wardriving
Introducing Wardriving
Warchalking
Warspying
Software for Defense
More About Wardriving
Summary
Chapter 7: Viruses and Wi-Fi
Understanding Malicious Software
Examining Computer Viruses
Exposing Trojan Programs
Discovering Internet Worms
Discovering Blended Threats
Bot Software
Introducing Spyware
Investigating Viruses on Handhelds
Understanding the Hoax Problem
Summary
Part II: Protecting Yourself
Chapter 8: Technical Pitfalls and Solutions
Discovering Common Wi-Fi Problems
Detecting and Dealing with Interference
Defining Interoperability Issues
Learning About Antennas
Optimizing Equipment
Summary
Chapter 9: Wireless Privacy Concerns
Why Privacy Matters
Wi-Fi Privacy Threats
Demystifying Privacy Policies
Other Vulnerable Wireless Technology
Summary
Chapter 10: Encryption and Wi-Fi
Introducing Encryption
Understanding Modern Encryption Techniques
Debunking Wired Equivalent Privacy (WEP)
Investigating Wi-Fi Protected Access (WPA)
Introducing Pretty Good Privacy (PGP)
Summary
Chapter 11: Securing Your WLAN
Understanding WLAN Vulnerabilities
Changing Dangerous Default Settings
Understanding DHCP
Filtering Network Traffic
Modifying Broadcast Parameters
Using Encryption
Securing Clients and Hosts
Summary
Chapter 12: Protecting Your Wi-Fi Data
Identifying Threats to Wireless Data
Choosing backup systems
Protecting Your Hardware
Summary
Appendix A: Suppliers, Manufacturers, and Resources
Wi-Fi Resources
Security, Privacy, and Antivirus Resources
PDA, PC, and Accessory Manufacturers
Software
Appendix B: Wireless Standards
802.11a
802.11g
802.11c
802.11d
802.11e
802.11f
802.11h
802.11i
802.11 IR
802.11n
802.16a and WiMAX
Bluetooth and 802.15.1
802.15.4 and ZigBee
802.15.3 and WiMedia
HiperLAN
Glossary
A-F
G-L
M-R
S-W
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
List of Sidebars
Caution! Wireless Networking: Preventing a Data Disaster
ISBN: 076457213X
EAN: 2147483647
Year: 2003
Pages: 145
Authors:
Jack McCullough
BUY ON AMAZON
Qshell for iSeries
Running Qshell
Scripting
Command-Line Arguments
Functions
Accessing OS/400-Specific Objects
Absolute Beginner[ap]s Guide to Project Management
Key Skills of Project Managers
Project Definition Checklist
Summary of Supplemental Project Plan Components
Management Fundamentals for Project Control
High-Performing Teams
Cisco Voice Gateways and Gatekeepers
Analog Circuits
Dial Peers
Review Questions
Case Study: Deploying Gatekeepers to Assist in Migration to VoIP
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The AJAX Revolution
The Microsoft Client Library for AJAX
Partial Page Rendering
Remote Method Calls with ASP.NET AJAX
Building AJAX Applications with ASP.NET
An Introduction to Design Patterns in C++ with Qt 4
Member Access Specifiers
Sorted Map Example
What Happens If new Fails?
Preference: An Enumerated Type
Section C.3. Debugging
Sap Bw: a Step By Step Guide for Bw 2.0
Using a Variable to Access a Hierarchy Node Directly
Aggregates and Multi-Cubes
Summary
Summary
System Administration Assistant
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies