Wireless Network Security A Beginner's Guide

Nonfiction, Computers, Networking & Communications, Network Protocols, General Computing
Cover of the book Wireless Network Security A Beginner's Guide by Tyler Wrightson, McGraw-Hill Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Tyler Wrightson ISBN: 9780071760959
Publisher: McGraw-Hill Education Publication: May 6, 2012
Imprint: McGraw-Hill Education Language: English
Author: Tyler Wrightson
ISBN: 9780071760959
Publisher: McGraw-Hill Education
Publication: May 6, 2012
Imprint: McGraw-Hill Education
Language: English

Security Smarts for the Self-Guided IT Professional

Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and explains how to identify and prevent them. Actual cases of attacks against WEP, WPA, and wireless clients and their defenses are included.

This practical resource reveals how intruders exploit vulnerabilities and gain access to wireless networks. You'll learn how to securely deploy WPA2 wireless networks, including WPA2-Enterprise using digital certificates for authentication. The book provides techniques for dealing with wireless guest access and rogue access points. Next-generation wireless networking technologies, such as lightweight access points and cloud-based wireless solutions, are also discussed. Templates, checklists, and examples give you the hands-on help you need to get started right away.

Wireless Network Security: A Beginner's Guide features:

  • Lingo--Common security terms defined so that you’re in the know on the job
  • IMHO--Frank and relevant opinions based on the author's years of industry experience
  • In Actual Practice--Exceptions to the rules of security explained in real-world contexts
  • Your Plan--Customizable checklists you can use on the job now
  • Into Action--Tips on how, why, and when to apply new skills and techniques at work

This is an excellent introduction to wireless security and their security implications. The technologies and tools are clearly presented with copious illustrations and the level of presentation will accommodate the wireless security neophyte while not boring a mid-level expert to tears. If the reader invests the time and resources in building a lab to follow along with the text, s/he will develop a solid, basic understanding of what "wireless security" is and how it can be implemented in practice. This is definitely a recommended read for its intended audience. - Richard Austin, IEEE CIPHER, IEEE Computer Society's TC on Security and Privacy (E109, July 23, 2012)

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Security Smarts for the Self-Guided IT Professional

Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and explains how to identify and prevent them. Actual cases of attacks against WEP, WPA, and wireless clients and their defenses are included.

This practical resource reveals how intruders exploit vulnerabilities and gain access to wireless networks. You'll learn how to securely deploy WPA2 wireless networks, including WPA2-Enterprise using digital certificates for authentication. The book provides techniques for dealing with wireless guest access and rogue access points. Next-generation wireless networking technologies, such as lightweight access points and cloud-based wireless solutions, are also discussed. Templates, checklists, and examples give you the hands-on help you need to get started right away.

Wireless Network Security: A Beginner's Guide features:

This is an excellent introduction to wireless security and their security implications. The technologies and tools are clearly presented with copious illustrations and the level of presentation will accommodate the wireless security neophyte while not boring a mid-level expert to tears. If the reader invests the time and resources in building a lab to follow along with the text, s/he will develop a solid, basic understanding of what "wireless security" is and how it can be implemented in practice. This is definitely a recommended read for its intended audience. - Richard Austin, IEEE CIPHER, IEEE Computer Society's TC on Security and Privacy (E109, July 23, 2012)

More books from McGraw-Hill Education

Cover of the book Heart Failure: A Practical Approach to Treatment by Tyler Wrightson
Cover of the book Oracle CRM On Demand Deployment Guide by Tyler Wrightson
Cover of the book Java Programming by Tyler Wrightson
Cover of the book Electronics from the Ground Up: Learn by Hacking, Designing, and Inventing by Tyler Wrightson
Cover of the book Stories from Mexico / Historias de México, Premium Third Edition by Tyler Wrightson
Cover of the book CSS & CSS3: 20 Lessons to Successful Web Development by Tyler Wrightson
Cover of the book Trenchless Technology by Tyler Wrightson
Cover of the book Beyond the Deal: A Revolutionary Framework for Successful Mergers & Acquisitions That Achieve Breakthrough Performance Gains by Tyler Wrightson
Cover of the book Medical Biochemistry: The Big Picture by Tyler Wrightson
Cover of the book The Cleveland Clinic Way: Lessons in Excellence from One of the World's Leading Health Care Organizations VIDEO ENHANCED EBOOK by Tyler Wrightson
Cover of the book Building Financial Models, Chapter 12 - The Cash Flow Statement by Tyler Wrightson
Cover of the book Portfolio Performance Measurement and Benchmarking, Chapter 17 - Contributions to Return by Tyler Wrightson
Cover of the book John Douglas's Guide to Landing a Career in Law Enforcement by Tyler Wrightson
Cover of the book Bioinformatics: Sequence Alignment and Markov Models by Tyler Wrightson
Cover of the book Your First Powerboat by Tyler Wrightson
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy