How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken CISSP, CCNA, MCP, CPA

Computer Networking All About Cisco,Mikrotik and Juniper
User avatar
beginner
Admin
Admin
Posts: 774
Joined: 03 Feb 2016, 06:56
Status: Offline

How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken CISSP, CCNA, MCP, CPA

Postby beginner » 13 Feb 2016, 21:24

Now you can have the awesome benefits of wireless LANs without falling victim to their notorious security flaws. Leading wireless security expert Lee Barken shows you practical workarounds and fixes for the vulnerabilities in today's WLANs, introduces high-security wireless protocols new to the marketplace, and offers step-by-step instructions for protecting all your wireless information, from the home to the enterprise.This is the definitive and easy-to-use WLAN security book you've been searching for-whether you're a network administrator,security specialist, manager, or home user.

Copyright
Acknowledgments
Foreword
Introduction
Why I Wrote This Book
Organization

Chapter 1. The Need for Wireless LAN Security
Introduction
Security in Layers
Size Matters—What Are You Protecting?
Wireless LAN 101
Shared Key Authentication
Wi-Fi Protected Access (WPA)
Beware: The Walls are Listening…
Stop the RF Bleeding
Summary

Chapter 2. Introduction to WLAN
Introduction
Pre-802.11
802.11 (1997)
Spread Spectrum
801.11b
Interoperability
Critical Mass
802.11a
802.11g
Other Working Groups
802.11 Specification
A Tale of Two Topologies
CSMA/CA
RTS/CTS
Fragmentation
Summary

Chapter 3. WEP Vulnerabilities—Wired Equivalent Privacy?
Introduction
WEP 101
Decrypting the WEP Message
Key Management Problems
RC4 Stream Cipher
IV Collisions
Message Injection
Authentication Spoofing
Brute Force Attacks
Cracking WEP Keys
Now What?
Summary

Chapter 4. War Driving: Tools and Techniques
Introduction
What Is War Driving?
Wireless Sniffers
Putting It All Together
Ethical Considerations
War Chalking
Summary

Chapter 5. 802.11i, WPA, TKIP, and AES
Introduction
WPA to the Rescue!
TKIP
WPA for the Home
802.11i and AES
Summary

Chapter 6. 802.1x Explained
Introduction
Where Did 802.1x Come From?
Guilty Until Proven Innocent (or Authenticated)
802.1x Authentication Conversation
Solving Security Problems with 802.1x
But Wait, There's More!
Competing Standards
Summary

Chapter 7. Connecting a WLAN to the Wired Network
Introduction
Assessing the Information Assets
A Layered Approach
Multiple SSIDs
802.1x vs. VPN
Hands-on Projects
Summary

Chapter 8. How to Deploy a VPN for Wireless Environments
Introduction
PPTP vs. L2TP/IPSec
PPTP: Point-to-Point Tunneling Protocol
L2TP: Layer 2 Tunneling Protocol with IPSec
Choosing an Authentication Protocol
Building a VPN Server
Configuring the VPN Server
Configuring Clients
The Downside to VPNs
Summary

Chapter 9. How to Secure and Manage a Home Environment
Introduction
Basic Security Steps
Beyond Security: Managing the Network
AP on Steroids?
Linux Embedded Appliance Firewall (LEAF)
Adding Wireless Client Support to Bering
Sputnik Around the World
ReefEdge Dolphin
Summary

Chapter 10. How to Secure an Enterprise Environment
Introduction
802.1x Revisited
Setting Up the Authentication Server
Configuring the CA
Configuring the Authenticator
Using EAP-TLS with Windows 2000 Server
Summary

Chapter 11. Setting up a Secure Public Hotspot: Building a Linux-Based Access Point
Introduction
HostAP Prism Driver for Linux
NoCat
The 800-Pound Pebble
LEAF to the Rescue
Troubleshooting Tips
Summary

Appendix A. Introduction to RF
The History of Radio Frequency
Electromagnetism
Induction
Conduction
Radio Waves
Structure of a Wave
Modulation
Attenuation
Antennae
How Antennae Work
Different Kinds of Antennae
Antenna Types
Summary

Appendix B. 802.11 Frame Types
Management Frames
Control Frames
Data Frames

Appendix C. Community Wireless Networking
For Pay
Amenity
Utility
User Groups
The Mission
The Legal Issues
Sentre Partners in San Diego
Software Options for Free Hotspots
The Big Picture

Appendix D. Building a Pringles® Can Antenna
Shopping List
Tools You'll Need
Building the Antenna
You do not have the required permissions to view the files attached to this post.





User avatar
beginner
Admin
Admin
Posts: 774
Joined: 03 Feb 2016, 06:56
Status: Offline

Re: How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken CISSP, CCNA, MCP, CPA

Postby beginner » 01 Mar 2019, 13:23

brandho wrote:can you give me the password ?
thanks

check your inbox




Return to “Computer Networking”

Who is online

Users browsing this forum: No registered users and 1 guest

 

 

cron