Wireless Security Handbook 1st Edition by Aaron E. Earle – Ebook PDF Instant Download/Delivery: 978-0849333781, 0849333781
Full download Wireless Security Handbook 1st Edition after payment

Product details:
ISBN 10: 0849333781
ISBN 13: 978-0849333781
Author: Aaron E. Earle
The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker. This wide scope benefits anyone who has to administer, secure, hack, or conduct business on a wireless network. This text tackles wireless risk from many angles. It discusses the mitigation of wireless risk at the policy level, cost-effective ways of deploying wireless across large enterprises, and financial controls that reduce unforeseen risks in wireless projects. The handbook also offers the technical details of how you can design, build, and hack nearly all wireless security components. This volume also helps advance your career by covering all of the objectives of the three widely recognized wireless certifications–those administered by Planet3 Wireless and Cisco Systems. The book focuses on the wireless local area networking technologies that help you meet these objectives, while also analyzing almost all other facets of mobile communications.
Table of contents:
Wireless Network and Technology Fundamentals
-
Wireless Network Overview
-
RF Overview
-
Wireless Signal Propagation
-
Signal-to-Noise Ratio
-
Modulation
-
Wireless Groups
Wireless Security Threats and Risks
-
Risks and Threats of Wireless
-
Goals of Information Security
-
Analysis
-
Spoofing
-
Denial of Service
-
Malicious Code
-
Social Engineering
-
Rogue Access Points
-
Cell Phone Security
-
Wireless Hacking and Hackers
-
RFID
Legal Frameworks
-
The Legality of Computer Crime
-
Electronic Communications Privacy Act
-
Computer Fraud and Abuse Act
-
State Computer Crime Issues
Wireless Physical Layer Technologies
-
Wireless Physical Layer Technologies
-
ISM Spectrum
-
Frequency Hopping Spread Spectrum (FHSS)
-
Direct Sequence Spread Spectrum (DSSS)
-
Orthogonal Frequency Division Multiplexing (OFDM)
Wireless Management and MAC Layer
-
Wireless Management Frames
-
Beacon
-
Probe Request
-
Probe Response
-
Authentication
-
Association Request
-
Association Response
-
Disassociation and De-Authentication
-
CSMA/CA
-
Fragmentation
-
Distributed Coordination Function
-
Point Coordination Function
-
Interframe Spacing
-
Service Set Identifier (SSID)
Wireless Network Architectures
-
Wireless Local and Personal Area Networks
-
Ad Hoc Mode
-
Infrastructure Mode
-
Bridging
-
Repeater
-
Mesh Wireless Networks
-
Local Area Networking Standards
-
Personal Area Network (PAN) 802.15
Wide Area Wireless Technologies
-
Wide Area Wireless Technologies
-
Cell Phone Technologies
-
GPS
-
802.16 Air Interface Standard
-
802.20 Standard
Wireless Antenna Concepts
-
Wireless Antenna Theory
-
RF Antenna Overview
-
Fresnel Zone
-
Antenna Types
-
Connectors
Wireless Network Deployment
-
The Wireless Deployment Process
-
Gather Requirements
-
Estimation
-
Make the Business Case
-
Site Survey
-
Design
-
Staging
-
Deployment and Installation
-
Certification
-
Audit
Wireless Hardware
-
Wireless Access Points
-
Linksys Access Points
-
Cisco Access Points
-
Wireless End Devices
-
Laptops
-
Tablets
-
PDA Devices
-
Handheld Scanners
-
Smart Phones
-
Wi-Fi Phones
Wireless LAN Security
-
Wireless LAN Security
-
Wireless LAN Security History
-
Authentication
-
SSID
-
Wireless Security Basics
-
Equivalent Privacy Standard (WEP)
-
802.1x
-
Remote Authentication Dial-In User Service (RADIUS)
-
Extensible Authentication Protocol (EAP)
-
Wi-Fi Protected Access (WPA)
-
802.11i
-
Wi-Fi Protected Access (WPA2)
-
WLAN Authentication and Privacy Infrastructure (WAPI)
-
Rogue Access Points Detection
Attacks and Countermeasures
-
Breaking Wireless Security
-
The Hacking Process
-
Wireless Network Compromising Techniques
-
Access Point Compromising Techniques
Policy and Architecture
-
Wireless Security Policy
-
Policy Overview
-
The Policy-Writing Process
-
Risk Assessment
-
Impact Analysis
-
Wireless Security Policy Areas
-
Wireless Security Architectures
-
Static WEP Wireless Architecture
-
VPN
-
Wireless VPN Architecture Overview
-
VPN Policy Aspect
-
Wireless Gateway Systems
-
802.1x
-
Comparing Wireless Security Architectures
Wireless Tools
-
Wireless Tools
-
Scanning Tools
-
Sniffing Tools
-
Hybrid Tools
-
Denial-of-Service Tools
-
Cracking Tools
-
Access Point Attacking Tools
-
Other Wireless Security Tools
People also search for:
8 wireless security cameras
ss handbook pdf
xs wireless 2 sennheiser manual
xs wireless 2 manual
va handbook 0730/4 security and law enforcement
Tags: Aaron Earle, Wireless Security Handbook


