Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing Wireless LANs: A Practical Guide for Network Managers, LAN Administrators and the Home Office User

Whether you are a network manager tasked with providing local wireless access to corporate business systems, or a home-based user, keen to optimize your data communications network, security will be the issue uppermost in your mind.

Wireless LANs are becoming ubiquitous. From hotel lobbies to Starbucks coffee shops, from airports to offices, you can hardly avoid wireless LAN signals. Similarly widespread is the recognition that they are not secure.

Create a communications network with the appropriate level of security for your needs!

In Securing Wireless LANs Gil Held examines how wireless LANs operate, with special attention focused on the IEEE 802.11 standards. He clearly outlines the vulnerabilities in the standard and its extensions before going on to propose techniques and products you can use to overcome these limitations.

Find out …

  • how to optimise the embedded security features of the IEEE 802.11 standards and extensions.
  • how you can enhance the security of over-the-air transmission.
  • which products, technologies and techniques you can ‘bolt on’ to your wireless LAN to provide the level of security you need

For the busy reader:

  • an overview of methods and techniques that can be employed to improve on ‘off-the-shelf’ IEEE 802.11 security
  • a checklist of relevant security technologies and the products they are implemented in

Screen shots illustrating tools and techniques and plentiful examples make this an accessible and thorough introduction to Wireless LAN security.

About the Author
Gilbert Held is an internationally known award-winning author and teacher with over 30 years experience in managing communications networks.

(HTML tags aren't allowed.)

Robot Programmer's Bonanza
Robot Programmer's Bonanza
The first hands-on programming guide for today's robot hobbyist

Get ready to reach into your programming toolbox and control a robot like never before! Robot Programmer's Bonanza is the one-stop guide for everyone from robot novices to advanced hobbyists who are ready to go beyond just building robots and start...

Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard
Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard

Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types,...

Neuropathology Review
Neuropathology Review

Richard A. Prayson, md, summarizes in outline form for active pathologists and residents in training-as well as those seeking a concise up-to-date overview of the subject -the essential element of the neuropathology curriculum. Topics range from basic information on the spectrum of neurologic-related disease to pertinent pictorial examples of...

Schaum's Outline of Fundamentals of Relational Databases
Schaum's Outline of Fundamentals of Relational Databases


Master the fundamentals of relational databases with Schaum's­­the high-performance study guide. It will help you cut study time, hone problem-solving skills, and achieve your personal best on exams and projects!

Students love Schaum's Outlines because they produce results. Each year,...

Pro C# 5.0 and the .NET 4.5 Framework (Professional Apress)
Pro C# 5.0 and the .NET 4.5 Framework (Professional Apress)
Many moons ago (circa 2001), I was given the opportunity to write a book on a forthcoming Microsoft technology that was, at the time, dubbed NGWS (Next Generation Windows Software). As I began to examine the source code provided by Microsoft, I noticed numerous code comments referring to the “COOL” (Common Object...
Doing Business With China (Global Market Briefings Series)
Doing Business With China (Global Market Briefings Series)

This new edition of Doing Business with China marks the country’s first two historic events of the twenty-first century. On 11 December 2001, it finally became a member of the World Trade Organization (WTO), and on 15 November of the same year, with the official announcement of Mr. Hu Jintao’s appointment as Mr. Jiang...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy