802.11 Security

  • Authors:
  • Bruce Potter;Bob Fleck

  • Affiliations:
  • -;-

  • Venue:
  • 802.11 Security
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

From the Publisher:Wireless networks have opened up new possibilities for all types of users. From typical LAN environments to wireless ISPs to ad-hoc networking, 802.11, the most popular wireless LAN protocol, is changing the way we think about networking. Wireless networks provide new security challenges for users and network administrators alike. The lack of physical security, access to free auditing tools that double as attack tools, and the ability to monitor traffic without risk of being noticed make wireless networks an easy target for malicious users. Every link of the wireless network needs to be protected in order to properly secure your data. This book provides information on the fundamentals of wireless security. Readers will understand how 802.11 networks work and where the weak points are. It is important to know the potential attacks and the real risks in deploying a wireless network before attempting to secure one. 802.11 Security provides practical solutions for all major components of an 802.11 network. Station security configurations are documented for many operating systems, including Linux, FreeBSD, OpenBSD, Mac OS X, and Windows. Real world networks contain many different operating systems, and this book will give you the tools to secure whatever is thrown your way.