|
|
libcats.org
Real 802.11 Security: Wi-Fi Protected Access and 802.11iJon Edney, William A. Arbaugh"Real 802.11 Security provides clear descriptions of current and emerging security techniques. The authors handle complex topics nicely, and offer significant clarification of IEEE draft standards. - Russ Housley, IETF Security Area Director and founder of Vigil Security, LLC"This is certainly the definitive text on the internals of 802.11 security!" - John Viega, founder and chief scientist, Secure Software, Inc.This book keeps the exposition as straightforward as possible and enables you to cut through the maze of acronyms, hacking tools, rumored weaknesses, and vague vendor security claims to make educated security decisions when purchasing or deploying WLAN. - Simon Blake-Wilson, Director of Information Security, BCIBusiness professionals and advanced home users are captivated by the convenience of working on wireless networks. But how can privacy and security be maintained effectively? Real 802.11 Security describes an entirely new approach to wireless LAN security based on the latest developments in Wi-Fi technology. This is the book that will show you how to establish real security within your Wi-Fi LAN.Recent developments in Wi-Fi security achieve what no amount of reconfiguration can do: They solve the problem at the source. Wi-Fi Protected Access (WPA) repairs weaknesses in existing Wi-Fi systems and is designed to allow software upgrades. The upcoming 802.11i standard will offer a much higher level of security than previously offered and will provide flexible, extremely secure solutions for future products.Real 802.11 Security addresses the theory, implementations, and reality of Wi-Fi security. It provides an overview of security issues, explains how security works in Wi-Fi networks, and explores various security and authentication protocols. The book concludes with an in-depth discussion of real-world security issues and attack tools.Written by two experts in wireless security, Jon Edney and William Arbaugh, this book shows you how to stay informed and aware when making security decisions, and what steps you can take to implement the most effective, proactive wireless security now and in the future.
Скачать книгу бесплатно (chm, 2.93 Mb)
EPUB | FB2 | PDF | MOBI | TXT | RTF
* Конвертация файла может нарушить форматирование оригинала. По-возможности скачивайте файл в оригинальном формате.
Популярные книги за неделю:
Система упражнений по развитию способностей человека (Практическое пособие)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 818 Kb
Сотворение мира (3-х томник)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 817 Kb
Только что пользователи скачали эти книги:
Tad Williams - Memory Sorrow & Thorn 02 - Stone of FarewellАвтор: Williams Tad
Размер книги: 887 Kb
Applications of nonverbal communicationАвтор: Ronald E. Riggio, Автор: Robert S. Feldman
Размер книги: 20.72 Mb
Как создать язык программирования и трансляторАвтор: Хохлов А.В.Категория: Наука
Размер книги: 61 Kb
Комментарий к Закону РФ Об образованииАвтор: Кирилин А. В.Категория: Нормативная литература
Размер книги: 2.15 Mb
Gap Junctions: Molecular Basis of Cell Communication in Health and DiseaseАвтор: Camillo Peracchia, Автор: Arnost Kleinzeller, Автор: Fambrough M. Douglas, Автор: Dale J. Benos
Размер книги: 35.05 Mb
Virginia Woolf and Fascism: Resisting the Dictators' SeductionАвтор: Merry M. Pawlowski
Размер книги: 1.93 Mb
Justice and Natural Resources: Concepts, Strategies, and ApplicationsАвтор: Kathryn Mutz, Автор: Gary Bryner, Автор: Douglas Kenney, Автор: Gerald Torres
Размер книги: 2.22 Mb
Do Political Campaigns Matter?: Campaign Effects in Elections and Referendums (Routledge ECPR Studies in European Political Science)Автор: David M. Farrell, Автор: Rüdiger Schmitt-Beck
Размер книги: 2.73 Mb
|
|
|