Read Online and Download Ebook How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken
Reading is sort of should do daily. Like what you do your daily activities, consuming or doing your day-to-day activities. As well as currently, why should be reading? Reading, one more time, can help you to find new manner in which will certainly get you to life much better. That's not exactly what you call as the responsibility. You could read How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken in the leisure as extra activities. It will not also obligate you to read it for numerous pages. Just, by actions and you can see just how this publication remarkably.
How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken
Success can be started by procedure. Among processes that are extremely immediate as well as crucial is by reading publications. Why should read? Checking out turns into one the simplest means to reach the expertise, to enhance the experiment, and also to obtain the motivations openly. Guide that ought to be read are additionally different. However, it will certainly depend on the cases that connect to you.
This is not type of common book. It gives you fantastic content to get the inspirations. Next to, the existence of this book will lead you to constantly feel far better. You might not have to develop or invest more time to go; the How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken can be acquired from the soft documents. Yeah, as this is an online library, you could discover lots of kinds and also categories of the books based upon the styles that you really require.
Besides, this book is likewise written by one of the most prominent author in the country. So, when you admire the writer a lot, it will certainly finish the collections of the literary works. But, when you are not extremely fan of the writer, you could still love How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken since you will certainly recognize how the writer tells the material to the viewers and culture. You could make handle this publication as one of referred details to make you feel appreciated so much with this book.
After getting this publication, it will certainly be better for you to read it as soon as possible. This book will connect the description and also reasons of why this publication is most wanted. It will certainly be the ways you obtain the new ability and skills to be far better. Obviously it will certainly assist you to deal with the problems of due date jobs. How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken is very significant to do and also obtain, so exactly what sort of book material that you require now? Find them in the listings of this website.
From the Back Cover
Now you can have the awesome benefits of wireless LANswithout falling victim to their notorious security flaws. Leadingwireless security expert Lee Barken shows you practicalworkarounds and fixes for the vulnerabilities in today'sWLANs, introduces high-security wireless protocols new to themarketplace, and offers step-by-step instructions for protectingall your wireless information, from the home to the enterprise.This is the definitive and easy-to-use WLAN security book you'vebeen searching for--whether you're a network administrator,security specialist, manager, or home user.
Topics covered include-- About the Author
About the Author
LEE BARKEN, CISSP, CCNA, MCP, CPA, has been in the IT industry since 1987. He has worked as anIT consultant and network security specialist for Ernst and Young's Information Technology RiskManagement (ITRM) practice and KPMG's Risk and Advisory Services (RAS) practice. He co-foundedthe San Diego Wireless Users Group and writes and speaks on the topic of wireless LANtechnology and security. He is the technical editor for Mobile Business Advisor Magazine, andteaches Wireless LAN Security and Deployment classes for the University of California at SanDiego (UCSD) extension.
Excerpt. © Reprinted by permission. All rights reserved.
Introduction
How Secure is Your Wireless Network? is a book about taking the next step and securing yourwireless network. Announcements by major companies backing wireless technologies are settingthe stage for wide-scale deployments and the ushering in a new era of wireless freedom.Companies like Intel have announced the Centrino chipset that will integrate 802.11functionality into their products. Dell, Gateway, IBM and others have announced initiatives tointegrate wireless technology into their laptops. T-Mobile, Boingo, Wayport and dozens ofothers have deployed hotspots in Starbucks, Borders, and Kinkos locations as well as hotels,airports and other public venues across the world. Almost every University has deployed somekind of wireless initiatives, with high schools and elementary schools following in theirfootsteps. Millions of home users have discovered the joys of wireless networking. Nowbusinesses everywhere are getting on board as well.
The bottom line is that wireless is here to stay. The integration of 802.11 into almost allnew laptops and handheld devices, coupled with the explosion in availability of public hotspotshas created a virtuous cycle of large-scale wireless proliferation. This invisible, yetinescapable flood of radio waves has landed squarely in our homes and businesses where itpresents a whole new security challenge. How do we embrace the joys of wireless networks whilewe maintain an essential balance with the security needs of our organization?
This book is all about understanding the technology, recognizing the security risks andimplementing a responsible and realistic game plan for safe and secure wireless communication.
Why I Wrote This BookAlthough I had seen many demonstrations of wireless networks, it wasn't until the summer of2001, that I found my true inspiration. At a large security conference, after listening tospeakers talk about community wireless networks, WLAN security and other wireless topics, Icame back home energized and decided it was time to put that spirit to work. A few weeks later,I started the San Diego Wireless Users Group with some friends and found my new passion inwireless technology. With the help of countless dedicated volunteers, including Alan Koebrick,John Eder, Eric Bermel, Michael Mee, and others, we hold monthly meetings with presentations ona variety of topics to share our passion for learning, meet likeminded wireless enthusiasts andhelp one other learn more about this wonderful technology. I've always enjoyed being a "tinkerer," eager to learn how things work.I was the kid who took apart the radio (or telephone, or video game) to check out the parts andunderstand how something operated. Wireless LANs were no different. Fundamentally, if you wantto develop a genuine appreciation for the security risks of wireless networks, you have to rollup your sleeves, get some wireless components together and play.
I wrote this book to go beyond the "WEP is bad" headlines and dig a little deeper tounderstand exactly what was happening under the hood and what to do about it.
OrganizationThe journey of How Secure is Your Wireless Network? begins with an introduction to wirelesssecurity including a detailed review of the risks and attacks. Next, we move into a tour of thenative 802.11 security solutions. Finally, we explore a variety of hands-on deploymentsolutions.
Here is an overview of each chapter--
Chapter 1 is a review of the general wireless landscape. We begin to ask some of the keyquestions that will lay a foundation for the rest of the book. In particular, we look at howsecurity decisions are affected by factors such as deployment size, mobility needs and othersecurity design requirements. We also review SSID broadcasts, MAC filtering, and Shared KeyAuthentication.
Chapter 2 starts with a stroll down memory lane as we outline some of the history of the802.11 protocol including 802.11 (1997), Direct Sequence Spread Spectrum (DSSS), and FrequencyHopping Spread Spectrum (FHSS). We take a look at 802.11 a, b and g and some of theirperformance characteristics. Next, we dig deeper into the 802.11 protocol with a review ofarchitecture topologies ("Infrastructure" and "Ad-Hoc" modes) as well as CSMA/CA, RTS/CTS andFragmentation.
Chapter 3 is where we jump into a detailed review of WEP and its vulnerabilities. Thisincludes a description and explanation of all known WEP attacks.
Chapter 4 describes "War Driving," including all of the hardware, software, tools and techniques so you can understand how to discover Access Points on your own. We include adiscussion of War Chalking and the ethical considerations of War Driving.
Chapter 5 discusses 802.11i, WPA, TKIP and AES. In this Chapter, we dig a little deeperinto WEP vulnerabilities and ways in which we can mitigate the risk with newer technologies.This includes a description of new encryption methods such as TKIP, AES and other 802.11igoodies.
Chapter 6 follows up on Chapter 5 with a detailed analysis of how 802.1x works, as well asa review of popular EAP types and guidelines to help you choose which one is best for yourparticular situation.
Chapter 7 focuses on transitioning between the "under the hood" theme in the first half ofthe book, into the "hands-on" theme of the second half of the book. In this Chapter we discussthe basic security architecture considerations when connecting the WLAN to the wired networkand moving from theory to application.
Chapter 8 discusses VPNs, a comparison of various technologies and a step-by-stepdescription of how to implement a Microsoft VPN solution.
Chapter 9 talks about securing home environments. It includes a step-by-step guide tobuilding a Linux Embedded Appliance Firewall (LEAF), Sputnik and ReefEdge's Dolphin.
Chapter 10 revisits 802.1x and discusses security in an enterprise environment. Thestep-by-step instructions describe how to deploy 802.1x using Microsoft as a Supplicant andAuthentication Server, with a Cisco AP as the Authenticator.
In Chapter 11 we review 802.11 in a public hotspot environment. For our step-by-stepproject, we describe how to build a Linux based AP using HostAP, NoCat and LEAF.
Appendix A offers an introdcution to RF. Appendix B discusses various 802.11 frame types.Appendix C gives a detailed overview of community wireless networking. And finally, in AppendixD, you'll find detailed instructions, with illustrations, on how to build a working wirelessantenna out of a cylindrical potato-chip can.
Thank you for choosing this book.
How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN
By Lee Barken PDF
How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN
By Lee Barken EPub
How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN
By Lee Barken Doc
How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN
By Lee Barken iBooks
How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN
By Lee Barken rtf
How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN
By Lee Barken Mobipocket
How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN
By Lee Barken Kindle