Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Real 802.11 Security: Wi-Fi Protected Access and 802.11i

Buy

"Real 802.11 Security provides clear descriptions of current and emerging security techniques. The authors handle complex topics nicely, and offer significant clarification of IEEE draft standards."
-Russ Housley, IETF Security Area Director and founder of Vigil Security, LLC

"This is certainly the definitive text on the internals of 802.11 security!"
-John Viega, founder and chief scientist, Secure Software, Inc.

"This book keeps the exposition as straightforward as possible and enables you to cut through the maze of acronyms, hacking tools, rumored weaknesses, and vague vendor security claims to make educated security decisions when purchasing or deploying WLAN."
-Simon Blake-Wilson, Director of Information Security, BCI

Business professionals and advanced home users are captivated by the convenience of working on wireless networks. But how can privacy and security be maintained effectively? Real 802.11 Security describes an entirely new approach to wireless LAN security based on the latest developments in Wi-Fi technology. This is the book that will show you how to establish real security within your Wi-Fi LAN.

Recent developments in Wi-Fi security achieve what no amount of reconfiguration can do: They solve the problem at the source. Wi-Fi Protected Access (WPA) repairs weaknesses in existing Wi-Fi systems and is designed to allow software upgrades. The upcoming 802.11i standard will offer a much higher level of security than previously offered and will provide flexible, extremely secure solutions for future products.

Real 802.11 Security addresses the theory, implementations, and reality of Wi-Fi security. It provides an overview of security issues, explains how security works in Wi-Fi networks, and explores various security and authentication protocols. The book concludes with an in-depth discussion of real-world security issues and attack tools.

Written by two experts in wireless security, Jon Edney and William Arbaugh, this book shows you how to stay informed and aware when making security decisions, and what steps you can take to implement the most effective, proactive wireless security now and in the future.

(HTML tags aren't allowed.)

How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN
How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN
Now you can have the awesome benefits of wireless LANs without falling victim to their notorious security flaws. Leading wireless security expert Lee Barken shows you practical workarounds and fixes for the vulnerabilities in today's WLANs, introduces high-security wireless protocols new to the marketplace, and offers step-by-step instructions...
A Practical Approach to Compiler Construction (Undergraduate Topics in Computer Science)
A Practical Approach to Compiler Construction (Undergraduate Topics in Computer Science)

This book provides a practically-oriented introduction to high-level programming language implementation. It demystifies what goes on within a compiler and stimulates the reader's interest in compiler design, an essential aspect of computer science. Programming language analysis and translation techniques are used in many software...

The Auction App: How Companies Tap the Power of Online Auctions to Maximize Revenue Growth
The Auction App: How Companies Tap the Power of Online Auctions to Maximize Revenue Growth

How companies such as L. L. Bean and Sun Microsystems are using online auctions to help boost their bottom lines

From liquidating excess inventory to B2B materials procurement, corporate America has discovered online auctions as a catalyst for redefining old supply-chain relationships and business practices. Most analysts...


Biomarkers of Environmentally Associated Disease: Technologies, Concepts, and Perspectives
Biomarkers of Environmentally Associated Disease: Technologies, Concepts, and Perspectives

The end of the 20th century brought with it a revolution in molecular biology that culminated in advances such as the completion of the human genome. This has brought optimism to the fields of toxicology and environmental health, and the anticipation that molecular biomarkers might soon come of age and have a major impact on human and...

Mastering XML
Mastering XML

Are you a newcomer to XML, hoping to learn about all the excitement? If the answer is “Yes,” you will not be disappointed. By the time you have finished reading Mastering XML, you will have an excellent grasp of the critical elements of XML and probably be writing XML code. You’ll also have learned about each...

Into the Bermuda Triangle
Into the Bermuda Triangle

Still unsolved, still baffling, still claiming new victims. Here are the untold stories.

A pilot reports a strange haze enveloping his plane, then disappears; eleven hours after fuel starvation, as if calling from a void, he is heard 600 miles away. He requests permission to land, then vanishes forever. A freighter steaming over placid...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy