Flylib.com
Caution! Wireless Networking: Preventing a Data Disaster
Caution! Wireless Networking: Preventing a Data Disaster
ISBN: 076457213X
EAN: 2147483647
Year: 2003
Pages: 145
Authors:
Jack McCullough
BUY ON AMAZON
Table of Contents
BackCover
Caution Wireless Networking--Preventing a Data Disaster
Introduction
How This Book Is Organized
Part I: Understanding the Threat
Chapter 1: A Brief Overview of Wi-Fi
Introducing Wi-Fi
Examining Wi-Fi Equipment
Equipment Worth Avoiding
Demystifying Wireless Standards
Introducing Organizations and Certification
Summary
Chapter 2: Network Fundamentals and Security Concerns
Explaining Networking Terms
Examining Network Models
Demystifying the TCPIP Protocols
Understanding Network Addresses and Names
Connecting Networks
Summary
Chapter 3: The People Behind the Problem
Separating Hackers from Crackers
Visiting the Underground Cracker Culture
What Makes Hackers and Crackers Tick
Hacker Conventions and Gatherings
Examining Crackers Tricks
Entertaining HackingCracking Resources
Summary
Chapter 4: Hijacking Wi-Fi
Hijacking Sessions
Understanding Rogue Access Points
Uncovering Denial of Service Attacks
Summary
Chapter 5: More Wireless Attacks
Attacking Hosts
Sniffing the Network
Summary
Chapter 6: Wardriving
Introducing Wardriving
Warchalking
Warspying
Software for Defense
More About Wardriving
Summary
Chapter 7: Viruses and Wi-Fi
Understanding Malicious Software
Examining Computer Viruses
Exposing Trojan Programs
Discovering Internet Worms
Discovering Blended Threats
Bot Software
Introducing Spyware
Investigating Viruses on Handhelds
Understanding the Hoax Problem
Summary
Part II: Protecting Yourself
Chapter 8: Technical Pitfalls and Solutions
Discovering Common Wi-Fi Problems
Detecting and Dealing with Interference
Defining Interoperability Issues
Learning About Antennas
Optimizing Equipment
Summary
Chapter 9: Wireless Privacy Concerns
Why Privacy Matters
Wi-Fi Privacy Threats
Demystifying Privacy Policies
Other Vulnerable Wireless Technology
Summary
Chapter 10: Encryption and Wi-Fi
Introducing Encryption
Understanding Modern Encryption Techniques
Debunking Wired Equivalent Privacy (WEP)
Investigating Wi-Fi Protected Access (WPA)
Introducing Pretty Good Privacy (PGP)
Summary
Chapter 11: Securing Your WLAN
Understanding WLAN Vulnerabilities
Changing Dangerous Default Settings
Understanding DHCP
Filtering Network Traffic
Modifying Broadcast Parameters
Using Encryption
Securing Clients and Hosts
Summary
Chapter 12: Protecting Your Wi-Fi Data
Identifying Threats to Wireless Data
Choosing backup systems
Protecting Your Hardware
Summary
Appendix A: Suppliers, Manufacturers, and Resources
Wi-Fi Resources
Security, Privacy, and Antivirus Resources
PDA, PC, and Accessory Manufacturers
Software
Appendix B: Wireless Standards
802.11a
802.11g
802.11c
802.11d
802.11e
802.11f
802.11h
802.11i
802.11 IR
802.11n
802.16a and WiMAX
Bluetooth and 802.15.1
802.15.4 and ZigBee
802.15.3 and WiMedia
HiperLAN
Glossary
A-F
G-L
M-R
S-W
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
List of Sidebars
Caution! Wireless Networking: Preventing a Data Disaster
ISBN: 076457213X
EAN: 2147483647
Year: 2003
Pages: 145
Authors:
Jack McCullough
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Process for Assessing Risk
Foundations and Principles of Security
Defining the Scope of the Assessment
Post-Assessment Activities
Document Tracking Form
Metrics and Models in Software Quality Engineering (2nd Edition)
The Object-Oriented Development Process
Some Basic Measures
Halsteads Software Science
Cyclomatic Complexity
Getting Started with a Software Metrics Program
Postfix: The Definitive Guide
Message Store Formats
Separate Message Store
Backup MX
Outbound Mail Relay
A.1. Postfix Parameter Reference
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 314 Outlet, Device, Pull, and Junction Boxes; Conduit Bodies; Fittings; and Handhole Enclosures
Article 358 Electrical Metallic Tubing Type EMT
Article 366 Auxiliary Gutters
Article 427: Fixed Electric Heating Equipment for Pipelines and Vessels
Annex D. Examples
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
Basic ImageReady Animation, Tweening, and Layer Styles
Photoshop Layers and After Effects
Blue-Screen Garbage Mattes
Rotoscoping Techniques with Photoshop
Appendix Adobe Photoshop and After Effects Resources
Digital Character Animation 3 (No. 3)
Designing a Character
Facial Rigging
Animating the Face
Insects and Spiders
Acting Technique
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies