𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

How to Cheat at Securing a Wireless Network

✍ Scribed by Chris Hurley, Jan Kanclirz Jr.


Publisher
Syngress
Year
2006
Tongue
English
Leaves
479
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors: * Denial of service (DoS) and other network layer attacks * Unauthorized access across the perimeter and within the organization Application layer intrusions and attacks, both from within and outside the network Extended connectivity through remote access and extranets * An increase in unmanaged or ill-managed endpoint devices * New applications like VoIP, instant messaging, and peer-to-peer This book provides the busy network administrator with best-practice solutions address these threats and to maintain a secure and accessible wireless network. The book endorses the principle that the best strategy is to deploy multiple layers of security, each reinforcing the other. Yet it never strays from its emphasis on the practical; that any tool or methodology that is deployed must work reliably, allow sufficient access, and require a minimal amount of maintenance.


πŸ“œ SIMILAR VOLUMES


How to Cheat at Securing a Wireless Netw
✍ Hurley C. etc. πŸ“‚ Library 🌐 English

Π˜Π·Π΄Π°Ρ‚Π΅Π»ΡŒΡΡ‚Π²ΠΎ Syngress Publishing, 2006, -418 pp.<div class="bb-sep"></div>You’ve been on an extended business trip and have spent the long hours of the flight drafting follow-up notes from your trip while connected to the airline’s onboard server. After deplaning, you walk through the gate and conti

How to cheat at securing your network
✍ Ido Dubrawsky πŸ“‚ Library πŸ“… 2007 πŸ› Syngress 🌐 German

Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information ava

How to Cheat at Designing Security for a
✍ Chris Ruston, Chris Peiris πŸ“‚ Library πŸ“… 2006 πŸ› Syngress 🌐 English

This guide for busy IT managers describes best practices for creating secure and available remote access to Windows Server 2003 enterprise networks. Each stage of the process is covered, from the analysis of a company's business requirements through the design of various individual components of the

How to Cheat at Voip Security (How to Ch
✍ Thomas Porter, Michael Gough πŸ“‚ Library πŸ“… 2007 🌐 English

The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies us

How to Cheat at Voip Security (How to Ch
✍ Thomas Porter, Michael Gough πŸ“‚ Library πŸ“… 2007 🌐 English

The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies us