ΠΠ·Π΄Π°ΡΠ΅Π»ΡΡΡΠ²ΠΎ Syngress Publishing, 2006, -418 pp.<div class="bb-sep"></div>Youβve been on an extended business trip and have spent the long hours of the flight drafting follow-up notes from your trip while connected to the airlineβs onboard server. After deplaning, you walk through the gate and conti
How to Cheat at Securing a Wireless Network
β Scribed by Chris Hurley, Jan Kanclirz Jr.
- Publisher
- Syngress
- Year
- 2006
- Tongue
- English
- Leaves
- 479
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors: * Denial of service (DoS) and other network layer attacks * Unauthorized access across the perimeter and within the organization Application layer intrusions and attacks, both from within and outside the network Extended connectivity through remote access and extranets * An increase in unmanaged or ill-managed endpoint devices * New applications like VoIP, instant messaging, and peer-to-peer This book provides the busy network administrator with best-practice solutions address these threats and to maintain a secure and accessible wireless network. The book endorses the principle that the best strategy is to deploy multiple layers of security, each reinforcing the other. Yet it never strays from its emphasis on the practical; that any tool or methodology that is deployed must work reliably, allow sufficient access, and require a minimal amount of maintenance.
π SIMILAR VOLUMES
Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information ava
This guide for busy IT managers describes best practices for creating secure and available remote access to Windows Server 2003 enterprise networks. Each stage of the process is covered, from the analysis of a company's business requirements through the design of various individual components of the
The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies us
The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies us