Atnaujinkite slapukų nuostatas

El. knyga: Wireless Security: Know It All

(Security/Network Engineer for NSight Technologies, USA), , (Owner, Blackthorn Systems, New Hampshire, USA), , , (Principal Consultant, The Dynamic Consultant, CA, USA), (RF/Wireless Designer & Consu), , (Texas Instruments, Germantown, MD, USA),
  • Formatas: PDF+DRM
  • Serija: Newnes Know it All
  • Išleidimo metai: 19-Apr-2011
  • Leidėjas: Newnes (an imprint of Butterworth-Heinemann Ltd )
  • Kalba: eng
  • ISBN-13: 9780080949673
Kitos knygos pagal šią temą:
  • Formatas: PDF+DRM
  • Serija: Newnes Know it All
  • Išleidimo metai: 19-Apr-2011
  • Leidėjas: Newnes (an imprint of Butterworth-Heinemann Ltd )
  • Kalba: eng
  • ISBN-13: 9780080949673
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!

• A 360-degree view from our best-selling authors
• Hot topics covered
• The ultimate hard-working desk reference; all the essential information, techniques and tricks of the trade in one volume

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!

Communications engineers need to master a wide area of topics to excel. The Wireless Security Know It All covers every angle including Emerging Wireless Technologies and Security Issues, Wireless LAN and MAN Security, as well as Wireless Personal Area Networks.

• A 360-degree view from our best-selling authors
• Topics include Today’s Wireless Technology, Security Definitions and Concepts, and Wireless Handheld devices
• The ultimate hard-working desk reference; all the essential information, techniques and tricks of the trade in one volume

Daugiau informacijos

The latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!
About the Authors xiii
I. Wireless Technology
1(190)
Wireless Fundamentals
3(18)
The Wireless Medium
4(4)
Wireless Networking Basics
8(13)
Wireless Network Logical Architecture
21(26)
The OSI Network Model
21(3)
Network Layer Technologies
24(6)
Data Link Layer Technologies
30(6)
Physical Layer Technologies
36(9)
Operating System Considerations
45(1)
Summary
46(1)
Wireless Network Physical Architecture
47(30)
Wired Network Topologies---A Refresher
47(2)
Wireless Network Topologies
49(5)
Wireless LAN Devices
54(15)
Wireless PAN Devices
69(2)
Wireless MAN Devices
71(6)
Radio Communication Basics
77(60)
Mechanisms of Radio Wave Propagation
78(1)
Open Field Propagation
79(3)
Diffraction
82(2)
Scattering
84(1)
Path Loss
84(2)
Multipath Phenomena
86(1)
Flat Fading
87(3)
Diversity Techniques
90(5)
Noise
95(2)
Communication Protocols and Modulation
97(38)
Summary
135(2)
References
136(1)
Infrared Communication Basics
137(6)
The Ir Spectrum
137(1)
Infrared Propagation and Reception
138(4)
Summary
142(1)
Wireless LAN Standards
143(32)
The 802.11 WLAN Standards
143(5)
The 802.11 MAC Layer
148(5)
802.11 PHY Layer
153(6)
802.11 Enhancements
159(12)
Other WLAN Standards
171(2)
Summary
173(2)
Wireless Sensor Networks
175(16)
Introduction to Wireless Sensor Networks
175(1)
Individual Wireless Sensor Node Architecture
176(1)
Wireless Sensor Networks Architecture
177(2)
Radio Options for the Physical Layer in Wireless Sensor Networks
179(3)
Power Consideration in Wireless Sensor Networks
182(2)
Applications of Wireless Sensor Networks
184(4)
Future Developments
188(3)
References
188(3)
II. Security Definitions and Concepts
191(176)
Attacks and Risks
193(16)
Threats to Personal Privacy
194(1)
Fraud and Theft
194(1)
Internet Fraud
195(2)
Employee Sabotage
197(1)
Infrastructure Attacks
198(1)
Malicious Hackers
198(1)
Malicious Coders
198(1)
Industrial Espionage
199(2)
Social Engineering
201(8)
Endnotes
206(3)
Security Defined
209(24)
What Is Security?
210(1)
What Can We Do?
211(1)
Access Control and the Origins of Computer Security Theory
211(2)
Security Policies
213(9)
Data Integrity and Authentication
222(9)
Recommended Reading
231(2)
Standardizing Security
233(18)
Protocol Madness
234(1)
Standardizing Security---A Brief History
234(3)
Standardized Security in Practice
237(7)
Cryptography and Protocols
244(1)
Other Security Protocols
245(6)
Secure Sockets Layer
251(18)
SSL History
251(1)
Pesky PKI
252(2)
PKI Alternatives
254(3)
SSL under the Hood
257(9)
The SSL Session
266(2)
SSL in Practice
268(1)
Cryptography
269(24)
Do We Need Cryptography?
270(3)
Hashing---Low Security, High Performance
273(5)
To Optimize or Not to Optimize
278(9)
Choosing Cryptographic Algorithms
287(5)
Tailoring Security for Your Application
292(1)
Managing Access
293(24)
Access Control
293(16)
Password Management
309(8)
Endnotes
314(3)
Security and the Law
317(20)
The 1996 National Information Infrastructure Protection Act
317(1)
President's Executive Order on Critical Infrastructure Protection
318(1)
The USA Patriot Act of 2001
319(3)
The Homeland Security Act of 2002
322(1)
Changes to Existing Laws
323(11)
Investigations
334(1)
Ethics
334(3)
Endnotes
335(2)
Intrusion Process
337(26)
Profiling to Select a Target or Gather Information
337(1)
Social Engineering
338(1)
Searching Publicly Available Resources
339(1)
War-driving, -Walking, -Flying, and -Chalking
340(5)
Exploitable WLAN Configurations
345(1)
How Intruders Obtain Network Access to a WLAN
345(6)
Password Gathering and Cracking Software
351(4)
Share Enumerators
355(1)
Using Antennas and WLAN Equipment
355(1)
Denial-of-Service Attacks and Tools
356(3)
Rogue Devices as Exploitation Tools
359(4)
Endnotes
360(3)
Security Policy
363(4)
Best Practice #1
363(1)
Best Practice #2
364(2)
Best Practice #3
366(1)
III. Wireless Network Security
367(216)
Security in Traditional Wireless Networks
369(34)
Security in First Generation TWNs
369(1)
Security in Second Generation TWNs
369(12)
Security in 2.5 Generation TWNs
381(5)
Security in 3G TWNs
386(14)
Summary
400(3)
Wireless LAN Security
403(42)
Introduction
403(1)
Key Establishment in 802.11
404(2)
Anonymity in 802.11
406(1)
Authentication in 802.11
406(7)
Confidentiality in 802.11
413(5)
Data Integrity in 802.11
418(3)
Loopholes in 802.11 Security
421(1)
WPA
422(13)
WPA2 (802.11i)
435(10)
Security in Wireless Ad Hoc Networks
445(22)
Introduction
445(2)
Bluetooth
447(20)
Implementing Basic Wireless Security
467(36)
Introduction
467(1)
Enabling Security Features on a Linksys WAP11 802.11 b Access Point
467(6)
Filtering by Media Access Control (MAC) Address
473(3)
Enabling Security Features on a Linksys BEFW11 SR 802.11 b Access Point/Router
476(5)
Enabling Security Features on a Linksys WRT54G 802.11b/g Access Point/Router
481(5)
Enabling Security Features on a D-Link DI-624 AirPlus 2.4 GHz Xtreme G Wireless Router with 4-Port Switch
486(7)
Configuring Security Features on Wireless Clients
493(8)
Summary
501(1)
Solutions Fast Track
501(2)
Implementing Advanced Wireless Security
503(80)
Introduction
503(1)
Implementing WiFi Protected Access (WPA)
503(8)
Implementig a Wireless Gateway with Reef Edge Dolphin
511(14)
Implementing a VPN on a Linksys WRV54G VPN Broadband Router
525(11)
Implementing RADIUS with Cisco LEAP
536(19)
Understanding and Configuring 802.1X RADIUS Authentication
555(24)
Summary
579(1)
Solutions Fast Track
580(3)
IV. Other Wireless Technology
583(66)
Home Network Security
585(16)
Introduction
585(1)
The Basics of Wireless Networks
586(3)
Basic Wireless Network Security Measures
589(7)
Additional Hotspot Security Measures
596(3)
Summary
599(1)
Additional Resources
600(1)
Wireless Embedded System Security
601(14)
Wireless Technologies
601(8)
Bluetooth
609(1)
ZigBee
610(4)
Wireless Technologies and the Future
614(1)
RFID Security
615(34)
Introduction
615(1)
RFID Security in General
616(4)
RFID Radio Basics
620(1)
Why Use RFID?
621(1)
RFID Architecture
622(4)
Data Communications
626(3)
Physical Form Factor (Tag Container)
629(5)
Threat and Target Identification
634(6)
Management of RFID Security
640(7)
Summary
647(1)
Links to Sites
648(1)
Appendix A: Wireless Policy Essentials
649(52)
Wireless Position Statement
649(3)
ABC Inc. InfoSec Risk Assessment Policy
652(2)
ABC Inc. InfoSec Audit Policy
654(1)
ABC Inc. InfoSec Acceptable Use Policy
655(6)
ABC Inc. InfoSec Network Policy
661(5)
ABC Inc. InfoSec De-Militarized Zone (DMZ) Policy
666(4)
ABC Inc. InfoSec Router Policy
670(2)
ABC Inc. InfoSec Extranet Policy
672(4)
ABC Inc. InfoSec Remote Access Policy
676(4)
ABC Inc. InfoSec Dial-In Access Policy
680(2)
ABC Inc. InfoSec VPN Communication Policy
682(2)
ABC Inc. InfoSec Wireless Communication Policy
684(2)
ABC Inc. InfoSec Server Policy
686(4)
ABC Inc. InfoSec Password Policy
690(5)
ABC Inc. InfoSec Application Password Policy
695(3)
ABC Inc. InfoSec Anti-Virus Policy
698(2)
ABC Inc. InfoSec Policy Exception Form
700(1)
Appendix B: Glossary
701(14)
Index 715
Frank Thornton runs his own technology consulting firm, Blackthorn Systems, which specializes in information security and wireless networks. His specialties include wireless network architecture, design, and implementation, as well as network troubleshooting and optimization. An interest in amateur radio helped him bridge the gap between computers and wireless networks. Having learned at a young age which end of the soldering iron was hot, he has even been known to repair hardware on occasion. In addition to his computer and wireless interests, Frank was a law enforcement officer for many years. As a detective and forensics expert he has investigated approximately one hundred homicides and thousands of other crime scenes. Combining both professional interests, he was a member of the workgroup that established ANSI Standard "ANSI/NIST-CSL 1-1993 Data Format for the Interchange of Fingerprint Information." Alan Bensky, MScEE, an electronics engineering consultant with over 25 years of experience in analog and digital design, management, and marketing. Specializing in wireless circuits and systems, Bensky has carried out projects for varied military and consumer applications. He is the author of Short-range Wireless Communication, Second Edition, published by Elsevier, 2004, and has written several articles in international and local publications. He has taught courses and gives lectures on radio engineering topics. Bensky is a senior member of IEEE. Tony Bradley (CISSP-ISSAP) is the Guide for the Internet/Network Security site on About.com, a part of The New York Times Company. He has written for a variety of other Web sites and publications, including BizTech Magazine, PC World, SearchSecurity.com, WindowsNetworking.com, Smart Computing magazine, and Information Security magazine. Tony is a CISSP (Certified Information Systems Security Professional) and ISSAP (Information Systems Security Architecture Professional). He is Microsoft Certified as an MCSE (Microsoft Certified Systems Engineer) and MCSA (Microsoft Certified Systems Administrator) in Windows 2000 and an MCP (Microsoft Certified Professional) in Windows NT. Tony is recognized by Microsoft as an MVP (Most Valuable Professional) in Windows security.On his About.com site, Tony has on average over 600,000 page views per month and over 30,000 subscribers to his weekly newsletter. Tony was also author of Essential Computer Security: Everyones Guide to E-mail, Internet, and Wireless Security (ISBN: 1597491144). Chris Hurley is a Senior Penetration Tester in the Washington, DC area. He has more than 10 years of experience performing penetration testing, vulnerability assessments, and general INFOSEC grunt work. He is the founder of the WorldWide WarDrive, a four-year project to assess the security posture of wireless networks deployed throughout the world. Chris was also the original organizer of the DEF CON WarDriving contest. He is the lead author of WarDriving: Drive, Detect, Defend (Syngress Publishing, ISBN: 19318360305). He has contributed to several other Syngress publications, including Penetration Tester's Open Source Toolkit (ISBN: 1-5974490210), Stealing the Network: How to Own an Identity (ISBN: 1597490067), InfoSec Career Hacking (ISBN: 1597490113), and OS X for Hackers at Heart (ISBN: 1597490407). He has a BS from Angelo State University in Computer Science and a whole bunch of certifications to make himself feel important. Steve Rackley completed a PhD in Experimental Physics at the Cavendish Laboratory, University of Cambridge. Following a career spanning four decades in the energy industry, gaining experience in some of the main technologies that are key to geological carbon storage, he is currently a technical author, project consultant, and independent researcher into carbon capture and storage, and negative emissions technologies, with a particular interest in ocean based approaches. John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliabiltiy and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup. James F. Ransome, Ph.D., CISSP, CISM, has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph.D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently Vice President of Integrated Information Security at CH2M HILL in Denver, CO. George L. Stefanek, Ph.D., has over 18 years of experience as a systems administrator and manager of IS/IT departments. He has also consulted on information security issues for such clients as the U.S. Department of Defense.