User Disclaimer and Agreements

This blog is maintained for the personal use of the author, with the intention of creating a list of bookmarks of free audio-books, comics, e-books, games, magazine, music, series, softwares, tutorials and other materials available on the net therefore neither you can't sell, nor use it for any commercial purposes. The author of this blog respects the copyright law and did not upload any of those you find here. We just collects (by using google and other search engines) link(s) hosted or posted by other server/people. The creator of this page or the ISP(s) hosting any content on this site take no responsibility for the way you use the information provided on this site. These audio-books, e-books, magazine, softwares, tutorials etc here are for educational purposes only and SHOULD BE VIEWED ONLY. If you download any files to view them, you are agreeing to delete them within a 24 hour period. It is strictly recommended to buy the products from the original owner/publisher of the products. The link(s) will be removed as soon as any complaint received from the original publisher/author of any material is published herein. Wish you have a good education.

Monday, July 7, 2008

Securing Wireless LAN's ebook

Wiley | ISBN: 0470851279 | 275 page | 2.7 MB | PDF

Wireless LANs are becoming ubiquitous. From hotel lobbies to Starbucks coffee shops, to airports and offices, it is difficult not to be able to pick up a wireless LAN signal. Accompanying the growth in the use of wireless LANs is a recognition that as initially designed they are not secure.

The focus of this book is upon wireless LAN security. In this book we will examine how wireless LANs operate, with special attention focused upon the manner in which security occurs under the IEEE 802.11 wireless LAN standard and its extensions, and why the standard and its extensions are weak. We will use this information to note many vulnerabilities associated with the use of wireless LANs and the security risks that can occur via an over-the-air transmission method. Because network managers and LAN administrators, as well as small business and home users of wireless LANs, need to know how to overcome the security limitations of wireless LANs, several chapters in this book are devoted to security enhancement techniques. One chapter is focused upon vendor-specific solutions, while a second chapter examines the use of existing and evolving standards that can be employed to literally harden your wireless LAN.

Download

No comments: