HOME > 상세정보

상세정보

802.11 security

802.11 security (5회 대출)

자료유형
단행본
개인저자
Potter, Bruce. Fleck, Bob.
서명 / 저자사항
802.11 security / Bruce Potter and Bob Fleck.
발행사항
Sebastopol, Calif. ;   Farnham :   O'Reilly ,   2002.  
형태사항
xiii, 176 p. : ill. ; 24 cm.
ISBN
0596002904(pbk.):
일반주기
Includes index.  
일반주제명
Computer networks -- Security measures. Wireless communication systems -- Security measures.
000 00776aamuu2200241 a 4500
001 000045115748
005 20040827100905
008 030414s2002 enka 001 0 eng
015 ▼a GBA2-U8307
020 ▼a 0596002904(pbk.): ▼c ?28.50
035 ▼a KRIC08641901
040 ▼a 241026 ▼c 241026 ▼d 211009
082 0 4 ▼a 005.8 ▼2 21
090 ▼a 005.8 ▼b P866s
100 1 ▼a Potter, Bruce.
245 1 0 ▼a 802.11 security / ▼c Bruce Potter and Bob Fleck.
260 ▼a Sebastopol, Calif. ; ▼a Farnham : ▼b O'Reilly , ▼c 2002.
300 ▼a xiii, 176 p. : ▼b ill. ; ▼c 24 cm.
500 ▼a Includes index.
650 0 ▼a Computer networks ▼x Security measures.
650 0 ▼a Wireless communication systems ▼x Security measures.
700 1 ▼a Fleck, Bob.

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 P866s 등록번호 121097480 (5회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

802.11b에 대한 전반적인 설명부터 무선 보안과 관련된 내용을 학습한다. 무선 보안의 이론에서부터 실제 적용에 이르기까지 광범위한 내용을 담고 있는 책으로 네트워크 보안 담당자, 시스템 엔지니어들에게 훌륭한 정보를 제공한다.

Mention wireless networks, and the question of security will soon follow. It's not surprising that in spite of compelling business arguments for going wireless, many companies are holding back because of security concerns. But, while it's true that wireless networks create security issues that don't exist in wired networks, the issues are not insurmountable. 802.11 Security shows how you can plan for and successfully contend with security obstacles in your wireless deployment. This authoritative book not only explains the security issues, but shows you how to design and build a your own secure wireless network. 802.11 Security covers the entire process of building secure 802.11-based wireless networks, in particular, the 802.11b ("Wi-Fi") specification. The authors provide detailed coverage of security issues unique to wireless networking, such as Wireless Access Points (WAP), bandwidth stealing, and the problematic Wired Equivalent Privacy component of 802.11. You'll learn how to configure a wireless client and to set up a WAP using either Linux or Free BSD. You'll also find thorough information on controlling network access and encrypting client traffic. Beginning with an introduction to 802.11b in general, the book gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. Next, the book details the technical setup instructions needed for both the Linux and FreeBSD operating systems. Some of the topics covered include:

  • Station Security for Linux, FreeBSD, Open BSD, Mac OS X and Windows
  • Setting Up Access Point Security
  • Gateway Security, including building Gateways, firewall Rules, Auditing, etc.
  • Authentication and Encryption
  • FreeBSD IPsec client and gateway configuration
  • Linux IPsec client and gateway configuration
  • 802.1x authentication
802.11 Security is a book whose time has come. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b-based systems, you'll want this book beside you every step of the way.


정보제공 : Aladin

저자소개

Bruce Potter(지은이)

<802.11 Security>

정보제공 : Aladin

목차

Part I. 802.11 Security Basics

1. A Wireless World
What Is Wireless?
Radio Transmission
Inherent Insecurity
802.11
Structure of 802.11 MAC
WEP
Problems with WEP
Is It Hopeless?

2. Attacks and Risks
An Example Network
Denial-of-Service Attacks
Man-in-the-Middle Attacks
Illicit Use
Wireless Risks
Knowing Is Half the Battle

Part II. Station Security

3. Station Security
Client Security Goals
Audit Logging
Security Updates

4. FreeBSD Station Security
FreeBSD Client Setup

5. Linux Station Security
Linux Client Setup
Kernel Configuration
OS Protection
Audit Logging
Secure Communication

6. OpenBSD Station Security
OpenBSD Client Setup
Kernel Configuration
OS Protection
Audit Logging

7. Mac OS X Station Security
Mac OS X Setup
OS Protection
Audit Logging

8. Windows Station Security
Windows Client Setup
OS Protection
Audit Logging
Secure Communication

Part III. Access Point Security

9. Setting Up an Access Point
General Access Point Security
Setting Up a Linux Access Point
Setting Up a FreeBSD Access Point
Setting Up an OpenBSD Access Point
Taking It to the Gateway

Part IV. Gateway Security

10. Gateway Security
Gateway Architecture
Secure Installation
Firewall Rule Creation
Audit Logging

11. Building a Linux Gateway
Laying Out the Network
Building the Gateway
Configuring Network Interfaces
Building the Firewall Rules
MAC Address Filtering
DHCP
DNS
Static ARP
Audit Logging
Wrapping Up

12. Building a FreeBSD Gateway
Building the Gateway
Building the Firewall Rules
Rate Limiting
DHCP
DNS
Static ARP
Auditing

13. Building an OpenBSD Gateway
Building the Gateway
Building the Firewall Rules
Rate Limiting
DHCP
DNS
Static ARP
Auditing

14. Authentication and Encryption
Portals
IPsec VPN
802.1x

15. Putting It All Together
Pieces of a Coherent System
User Knowledge
Looking Ahead


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)