Flylib.com
Maximum Wireless Security
Maximum Wireless Security
ISBN: 0672324881
EAN: 2147483647
Year: 2002
Pages: 171
Authors:
Cyrus Peikari
,
Seth Fogie
BUY ON AMAZON
Main Page
Table of content
Copyright
About the Authors
About the Technical Editors
We Want to Hear from You
Reader Services
Introduction
Part I: Wireless Fundamentals
Chapter 1. Wireless Hardware
Access Points
Linksys WAP11
NetGear ME102
Antennas
Radome-Enclosed Yagi Antenna: HyperLink HG2415Y
Parabolic Grid Antenna: HyperLink HG2419G
SigMax Omni-Directional: Signull SMISMCO10
SigMax Circular Yagi: Signull SMISMCY12
TechnoLab Log Periodic Yagi
Wireless NICs
ORiNOCO PC Card
Handheld Devices
Compaq iPAQ
Summary
Chapter 2. Wireless Network Protocols
Inside the 802.11 Standard
Inside the 802.11g Standard
802.11a Versus 802.11b
Understanding HomeRF
Understanding IrDA
Understanding Bluetooth
Summary
Chapter 3. Wireless Programming
HTMLXMLXHTML
WAPWMLWMLScript
Openwave SDK
i-mode
Java
.NET
Summary
Chapter 4. WEP Security
WEP Introduction
RC4 Encryption
How RC4 Works
Summary
Part II: Wireless Threats
Chapter 5. Cracking WEP
WEP Review
Data Analysis
Technical Example
IV Collision
Key Extraction
Summary
Chapter 6. Hacking Techniques
Diverse Hacker Attack Methods
Sniffing
Spoofing and Session Hijacking
Understanding Buffer Overflows
Unexpected Input
Denial-of-Service Attacks
Summary
Chapter 7. Wireless Attacks
Surveillance
War Driving
Client-to-Client Hacking
Rogue Access Points
Jamming (Denial of Service)
Practical WEP Cracking
Summary
Chapter 8. Airborne Viruses
Airborne Viruses
Virus Overview
Virus Prevention
Hostile Web Pages and Scripting
Palm OS
Viruses on Windows CE .NET
Handset Viruses
Summary
Part III: Tools of the Trade
Chapter 9. Auditing Tools
Ethereal
NetStumbler
Kismet
AirSnort
WEPCrack
Windows XP
AiroPeek NX
Summary
Chapter 10. Pocket PC Hacking
Important URLs
Pocket PC Installation
WLAN Drivers
MiniStumbler
CENiffer
Net Force and vxUtil
IBM Wireless Security Auditor
Summary
Chapter 11. Wireless Hack Walkthrough
The Test Network
Defining the Goal
Investigation and Discovery
Attack Preparation
Execution
Clean Up
Summary
Part IV: Wireless Security
Chapter 12. Securing the WLAN
Access Point-Based Security Measures
Third-Party Security Methods
Funk s Steel-Belted Radius
WLAN Protection Enhancements
Summary
Chapter 13. Virtual Private Networks
VPN Review
Tunneling
IPsec
L2TP
Attacks Against VPNs
Deploying VPNs in WLANs
Summary
Chapter 14. Intrusion Detection Systems
Log File Monitors
Integrity Monitors
IDS Theory
Receiver Operating Characteristic Curves
Hacking Through IDSs
The Future of IDSs
Summary
Chapter 15. Wireless Public Key Infrastructure
Public Key Cryptography
Digital Signatures
Certificate Authorities
Wireless PKI Implementation
Transaction Confirmation
Integrity of User Identities
Third-Party Services
WAP PKI
Summary
Part V: Appendixes
Appendix A. DecimalHexBinary Conversion Table
Appendix B. WEPCrack Exploit Code Example
GNU General Public License
Appendix C. References
Index
Index SYMBOL
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index J
Index K
Index L
Index M
Index N
Index O
Index P
Index R
Index S
Index T
Index U
Index V
Index W
Index X
Index Y
Maximum Wireless Security
ISBN: 0672324881
EAN: 2147483647
Year: 2002
Pages: 171
Authors:
Cyrus Peikari
,
Seth Fogie
BUY ON AMAZON
High-Speed Signal Propagation[c] Advanced Black Magic
Impedance in Series with the Return Path
Glossary of Cabling Terms
Making Glass Fiber
IBIS (I/O Buffer Information Specification)
IBIS: Issues with SSO Noise
Software Configuration Management
Configuration Status Accounting
Configuration Verification and Audit
CM Automation
Appendix E Test Plan
Appendix K Problem/Change Report
MySQL Clustering
Before You Begin with MySQL Cluster
SQL Nodes
MySQL Clusters Native Backup Tool
Restoring a Backup
Security for MySQL Cluster
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Wide Area Network (WAN) Technologies
Point-to-Point Protocol (PPP)
Internet Protocol (IP) Basics
Internet Group Management Protocol (IGMP)
Internet Information Services (IIS) and the Internet Protocols
The Complete Cisco VPN Configuration Guide
PPTP and L2TP Remote Access
L2L Connectivity Example
IPsec Connections
ISAKMP/IKE Phase 2 Configuration
ISAKMP/IKE Phase 2 Connections
GO! with Microsoft Office 2003 Brief (2nd Edition)
Project 1A. Exploring Outlook 2003
Concepts Assessments
Objective 4. Identify Types of Software and Their Uses
Project 4C. Recreation Ideas
Objective 4. Use a Date Function
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies