Real 802.11 security: Wi-Fi protected access and 802.11i
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston ; Munich [u.a.]
Addison-Wesley
2004
|
Ausgabe: | 3. print. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXI, 451 S. Ill. |
ISBN: | 0321136209 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV023363259 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 080625s2004 xxua||| |||| 00||| eng d | ||
020 | |a 0321136209 |9 0-321-13620-9 | ||
035 | |a (OCoLC)52197569 | ||
035 | |a (DE-599)BVBBV023363259 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-739 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 |2 21 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
100 | 1 | |a Edney, Jon |e Verfasser |4 aut | |
245 | 1 | 0 | |a Real 802.11 security |b Wi-Fi protected access and 802.11i |c Jon Edney and William A. Arbaugh |
250 | |a 3. print. | ||
264 | 1 | |a Boston ; Munich [u.a.] |b Addison-Wesley |c 2004 | |
300 | |a XXI, 451 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
630 | 0 | 7 | |a IEEE 802 |n 11 |0 (DE-588)4633968-1 |2 gnd |9 rswk-swf |
650 | 4 | |a IEEE 802.11 (Standard) | |
650 | 4 | |a Wireless LANs |x Security measures | |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Lokales Netz |0 (DE-588)4114441-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Drahtloses lokales Netz |0 (DE-588)4633975-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Lokales Netz |0 (DE-588)4114441-7 |D s |
689 | 0 | 1 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Drahtloses lokales Netz |0 (DE-588)4633975-9 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
689 | 2 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | |8 2\p |5 DE-604 | |
689 | 3 | 0 | |a IEEE 802 |n 11 |0 (DE-588)4633968-1 |D u |
689 | 3 | |8 3\p |5 DE-604 | |
700 | 1 | |a Arbaugh, William A. |e Sonstige |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016546666&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016546666 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804137727104385024 |
---|---|
adam_text | Contents
Preface
xv
Acknowledgments
xxi
Part
1
What Everyone Should Know
1
Chapter
1
Introduction
3
Setting the Scene
3
Roadmap to the Book
5
Notes on the Book
6
Chapter
2
Security Principles
7
What Is Security?
7
Good Security Thinking
8
1.
Don t Talk to Anyone You Don t Know
8
2.
Accept Nothing Without a Guarantee
10
3.
Treat Everyone as an Enemy until Proved Otherwise
11
4.
Don t Trust Your Friends for Long
í
2
5.
Use Well-Tried Solutions
13
6.
Watch the Ground You Are Standing on for Cracks
15
Security Terms
17
Summary
19
Chapter
3
Why Is Wi-Fi Vulnerable to Attack?
21
Changing the Security Model
21
What Are the Enemies Like?
22
Gaming Attackers
23
Profit or Revenge Attackers
25
Ego Attackers
26
Traditional Security Architecture
27
Option
1 :
Put Wireless LAN in the Untrusted Zone
29
Option
2:
Make Wi-Fi LAN Trusted
30
Danger of Passive Monitoring
31
Summary
32
Chapter
4
Different Types of Attack
33
Classification of Attacks
34
Attacks Without Keys
35
Snooping
3 6
Man-in-the-Middle Attack (Modification)
37
Attacks on the Keys
40
One-Time Passwords
41
Burying the Keys
41
Wireless Attacks
42
Attacking the Keys Through Brute Force
45
Dictionary Attacks
46
Algorithmic Attacks
47
Summary
48
Part II The Design of Wi-Fi Security
49
Chapter
5
IEEE
802.11
Protocol Primer
51
Layers
51
Wireless LAN Organization
53
Basics of Operation in Infrastructure Mode
54
Beacons
55
Probing
56
Connecting to an AP
56
Roaming
56
Sending Data
56
Protocol Details
57
General Frame Formats
57
AC header
58
Management Frames
60
Radio Bits
63
Summary
65
Chapter
6
How IEEE
802.11
WEP Works and Why It Doesn t
67
Introduction
67
Authentication
69
Privacy
72
Use ofRC4 Algorithm
73
Initialization Vector (IV)
74
WEP Keys
76
Mechanics of WEP
83
Fragmentation
83
Integrity Check Value (ICV)
84
Preparing the Frame for Transmission
85
RC4 Encryption Algorithm
86
Why WEP Is Not Secure
89
Authentication
90
Access Control
93
Replay Prevention
93
Message Modification Detection
94
Message Privacy
95
RC4 Weak Keys
99
Direct Key Attacks
100
Summary
101
Chapter
7
WPA, RSN, and IEEE
802.11
і
103
Relationship Between Wi-Fi and IEEE
802.11 103
What Is IEEE
802.1
li?
104
What Is WPA?
105
Differences Between RSN and WPA
106
Security Context
107
Keys
108
Security Layers
110
How the Layers Are Implemented 111
Relationship of the Standards
113
List of Standards
113
Pictorial Map
114
Summary
115
Chapter
8
Access Control: IEEE
802.1
Χ, ΕΑΡ,
and RADIUS
117
Importance of Access Control
117
Authentication for Dial-in Users
120
IEEE
802.
ЇХ
122
IEEE
802.
IX in a Simple Switched Hub Environment
124
IEEE
802.
IX in Wi-Fi LANs
127
ΕΑΡ
Principles
129
ΕΑΡ
Message Formats
131
EAPOL
133
EAPOL-Start
133
EAPOL-Key
134
EAPOL-Packet
134
EAPOL-Logoff
134
Messages Used in IEEE
802.
IX
135
Authentication Sequence
135
Implementation Considerations
137
RADIUS
—
Remote Access Dial-In User Service
138
RADIUS Mechanics
140
ΕΑΡ
over RADIUS
144
Use of RADIUS in WPA and RSN
146
Summary
147
Chapter
9
Upper-Layer Authentication
149
Introduction
149
Who Decides Which Authentication Method to Use?
150
Use of Keys in Upper-Layer Authentication
151
Symmetric Keys
151
Asymmetrie
Keys
151
Certificates and Certification Authorities
153
A Detailed Look at Upper-Level Authentication
Methods
155
Transport Layer Security (TLS)
155
Functions
oj
TLS
156
Handshake Exchange
í
59
Relationship of TLS Handshake and WPA /RSN
164
TLS over
ΕΑΡ
165
Summary of TLS
169
Kerberos V5 169
Using Tickets
169
Kerberos
Tickets
171
Obtaining the Ticket-Granting Ticket
171
Service Tickets
172
Cross-Domain Access
174
How Tickets Work
176
Use of
Kerberos
in RSN
178
Cisco Light
ΕΑΡ
(LEAP)
184
Protected
ΕΑΡ
Protocol (PEAP)
186
Phase
1 188
Phase
2 189
Status of PEAP
189
Authentication in the Cellular Phone World: EAP-SIM
189
Overview of Authentication in a GSM Network
191
Linking GSM Security to Wi-Fi LAN Security
192
EAP-SIM
193
Status of GSM-SIM Authentication
196
Summary
196
Chapter
10
WPA and RSN Key Hierarchy
199
Pairwise and Group Keys
199
Pairwise Key Hierarchy
201
Creating and Delivering the PMK
201
Computing the Temporal Keys
203
Exchanging and Verifying Key Information
204
Completing the Handshake
207
Group Key Hierarchy
207
Summary of the Key Establishment Process
210
Key Hierarchy Using AES-CCMP
211
Mixed Environments
212
Summary of Key Hierarchies
212
Details of Key Derivation for WPA
214
Four- Way Handshake
217
Group Key Handshake
223
Nonce Selection
224
Computing the Temporal Keys
225
Summary
229
Chapter
11
TKIP
231
What Is TKIP and Why Was It Created?
231
TKIP Overview
234
Message Integrity
235
IV Selection and Use
238
Per-Packet
Key Mixing
243
TKIP
Implementation Details
245
Message Integrity
—
Michael
249
Countermeasures
249
Computation of the MIC
252
Per-Packet Key Mixing
255
Substitution Table or S-Box
256
Phase
1
Computation
257
Phase
2
Computation
258
Summary
259
Chapter^ AES-CCMP
261
Introduction
261
Why AES?
262
AES Overview
264
Modes of Operation
264
Offset
Codebook
Mode (OCB)
269
How CCMP Is Used in RSN
269
Steps in Encrypting a Transmission
270
CCMP Header
271
Overview of Implementation
272
Steps in Encrypting an MPDU
273
Decrypting MPDUs
277
Summary
278
Chapter
13
Wi-Fi LAN Coordination: ESS and IBSS
279
Network Coordination
279
ESS Versus IBSS
280
Joining an ESS Network
280
WPA/RSN Information Element
282
Validating the Information Elements
283
Preauthentication Using IEEE
802.
IX
283
IBSS
Ad
-Нос
Networks
285
Summary
289
Part III Wi-Fi Security in the Real World
291
Chapter
14
Public Wireless Hotspots
293
Development of Hotspots
293
Public Wireless Access Defined
294
Barriers to Growth
294
Security Issues in Public Hotspots
296
How Hotspots Are Organized
297
Subscribers
298
Access Points
299
Hotspot Controllers
300
Authentication Server
302
Different Types of Hotspots
303
Airports
303
Hotels
303
Coffee Shops
303
Homes
304
How to Protect Yourself When Using a Hotspot
305
Personal Firewall Software
305
Virtual Private Network (VPN)
306
Summary
308
Chapter
15
Known Attacks: Technical Review
311
Review of Basic Security Mechanisms
311
Confidentiality
3Í2
Integrity
314
Review of Previous IEEE
802.11
Security Mechanisms
316
Confidentiality
316
RC4andWEP
316
Integrity and Authentication
321
Attacks Against the Previous IEEE
802.11
Security
Mechanisms
322
Confidentiality
322
Access Control
329
Authentication
330
Man-in-the-Middle Attacks
331
Management Frames
33
í
ARP
Spoofing
332
Problems
Created by Man-in-the-Middle Attacks
333
802. lx
and
ΕΑΡ
333
PEAP
334
Denial-of-Service Attacks
334
Layer
2
Denial-of-Service Attacks Against All Wi-Fi-Based
Standards
335
WPA Cryptographic Denial-of-Service Attack
335
Summary
336
Chapter
16
Actual Attack Tools
337
Attacker Goals
338
Process
338
Reconnaissance
338
Example Scenarios
345
Planning
346
Collection
348
Analysis
349
Execution
350
Other Tools of Interest
351
Airsnort 351
Airjack 352
Summary
353
Chapter
17
Open Source Implementation Example
355
General Architecture Design Guidelines
355
Protecting a Deployed Network
357
Isolate and Canalize
357
Upgrade Equipment s Firmware to WPA
351
What to Do If You Can t Do Anything
358
Planning to Deploy a WPA Network
359
Deploying the Infrastructure
360
Add a RADIUS Server for IEEE
802.
IX Support
3 60
Use a Public Key Infrastructure for Client Certificates
360
Install Client IEEE
802.
IX Supplicant Software
360
Practical Example Based on Open Source Projects
361
Server Infrastucture
361
Building an Open Source Access Point
3 74
Making It All Work
376
Summary
383
Acknowledgments
384
References and More Information
384
Appendixes
385
Appendix A Overview of the AES Block Cipher
387
Finite Field Arithmetic
388
Addition
389
Subtraction
390
Multiplication
390
Division
391
Galois Field GF()
392
Conclusion
397
Steps in the AES Encryption Process
398
Round Keys
399
Computing the Rounds
401
Decryption
403
Summary of AES
405
Appendix
В
Example Message Modification
407
Appendix
С
Verifying the Integrity of Downloaded Files
411
Checking the MD5 Digest
411
Checking the GPG Signature
412
Acronyms
417
References
421
Index
425
|
adam_txt |
Contents
Preface
xv
Acknowledgments
xxi
Part
1
What Everyone Should Know
1
Chapter
1
Introduction
3
Setting the Scene
3
Roadmap to the Book
5
Notes on the Book
6
Chapter
2
Security Principles
7
What Is Security?
7
Good Security Thinking
8
1.
Don't Talk to Anyone You Don't Know
8
2.
Accept Nothing Without a Guarantee
10
3.
Treat Everyone as an Enemy until Proved Otherwise
11
4.
Don't Trust Your Friends for Long
í
2
5.
Use Well-Tried Solutions
13
6.
Watch the Ground You Are Standing on for Cracks
15
Security Terms
17
Summary
19
Chapter
3
Why Is Wi-Fi Vulnerable to Attack?
21
Changing the Security Model
21
What Are the Enemies Like?
22
Gaming Attackers
23
Profit or Revenge Attackers
25
Ego Attackers
26
Traditional Security Architecture
27
Option
1 :
Put Wireless LAN in the Untrusted Zone
29
Option
2:
Make Wi-Fi LAN Trusted
30
Danger of Passive Monitoring
31
Summary
32
Chapter
4
Different Types of Attack
33
Classification of Attacks
34
Attacks Without Keys
35
Snooping
3 6
Man-in-the-Middle Attack (Modification)
37
Attacks on the Keys
40
One-Time Passwords
41
Burying the Keys
41
Wireless Attacks
42
Attacking the Keys Through Brute Force
45
Dictionary Attacks
46
Algorithmic Attacks
47
Summary
48
Part II The Design of Wi-Fi Security
49
Chapter
5
IEEE
802.11
Protocol Primer
51
Layers
51
Wireless LAN Organization
53
Basics of Operation in Infrastructure Mode
54
Beacons
55
Probing
56
Connecting to an AP
56
Roaming
56
Sending Data
56
Protocol Details
57
General Frame Formats
57
AC header
58
Management Frames
60
Radio Bits
63
Summary
65
Chapter
6
How IEEE
802.11
WEP Works and Why It Doesn't
67
Introduction
67
Authentication
69
Privacy
72
Use ofRC4 Algorithm
73
Initialization Vector (IV)
74
WEP Keys
76
Mechanics of WEP
83
Fragmentation
83
Integrity Check Value (ICV)
84
Preparing the Frame for Transmission
85
RC4 Encryption Algorithm
86
Why WEP Is Not Secure
89
Authentication
90
Access Control
93
Replay Prevention
93
Message Modification Detection
94
Message Privacy
95
RC4 Weak Keys
99
Direct Key Attacks
100
Summary
101
Chapter
7
WPA, RSN, and IEEE
802.11
і
103
Relationship Between Wi-Fi and IEEE
802.11 103
What Is IEEE
802.1
li?
104
What Is WPA?
105
Differences Between RSN and WPA
106
Security Context
107
Keys
108
Security Layers
110
How the Layers Are Implemented 111
Relationship of the Standards
113
List of Standards
113
Pictorial Map
114
Summary
115
Chapter
8
Access Control: IEEE
802.1
Χ, ΕΑΡ,
and RADIUS
117
Importance of Access Control
117
Authentication for Dial-in Users
120
IEEE
802.
ЇХ
122
IEEE
802.
IX in a Simple Switched Hub Environment
124
IEEE
802.
IX in Wi-Fi LANs
127
ΕΑΡ
Principles
129
ΕΑΡ
Message Formats
131
EAPOL
133
EAPOL-Start
133
EAPOL-Key
134
EAPOL-Packet
134
EAPOL-Logoff
134
Messages Used in IEEE
802.
IX
135
Authentication Sequence
135
Implementation Considerations
137
RADIUS
—
Remote Access Dial-In User Service
138
RADIUS Mechanics
140
ΕΑΡ
over RADIUS
144
Use of RADIUS in WPA and RSN
146
Summary
147
Chapter
9
Upper-Layer Authentication
149
Introduction
149
Who Decides Which Authentication Method to Use?
150
Use of Keys in Upper-Layer Authentication
151
Symmetric Keys
151
Asymmetrie
Keys
151
Certificates and Certification Authorities
153
A Detailed Look at Upper-Level Authentication
Methods
155
Transport Layer Security (TLS)
155
Functions
oj
TLS
156
Handshake Exchange
í
59
Relationship of TLS Handshake and WPA /RSN
164
TLS over
ΕΑΡ
165
Summary of TLS
169
Kerberos V5 169
Using Tickets
169
Kerberos
Tickets
171
Obtaining the Ticket-Granting Ticket
171
Service Tickets
172
Cross-Domain Access
174
How Tickets Work
176
Use of
Kerberos
in RSN
178
Cisco Light
ΕΑΡ
(LEAP)
184
Protected
ΕΑΡ
Protocol (PEAP)
186
Phase
1 188
Phase
2 189
Status of PEAP
189
Authentication in the Cellular Phone World: EAP-SIM
189
Overview of Authentication in a GSM Network
191
Linking GSM Security to Wi-Fi LAN Security
192
EAP-SIM
193
Status of GSM-SIM Authentication
196
Summary
196
Chapter
10
WPA and RSN Key Hierarchy
199
Pairwise and Group Keys
199
Pairwise Key Hierarchy
201
Creating and Delivering the PMK
201
Computing the Temporal Keys
203
Exchanging and Verifying Key Information
204
Completing the Handshake
207
Group Key Hierarchy
207
Summary of the Key Establishment Process
210
Key Hierarchy Using AES-CCMP
211
Mixed Environments
212
Summary of Key Hierarchies
212
Details of Key Derivation for WPA
214
Four- Way Handshake
217
Group Key Handshake
223
Nonce Selection
224
Computing the Temporal Keys
225
Summary
229
Chapter
11
TKIP
231
What Is TKIP and Why Was It Created?
231
TKIP Overview
234
Message Integrity
235
IV Selection and Use
238
Per-Packet
Key Mixing
243
TKIP
Implementation Details
245
Message Integrity
—
Michael
249
Countermeasures
249
Computation of the MIC
252
Per-Packet Key Mixing
255
Substitution Table or S-Box
256
Phase
1
Computation
257
Phase
2
Computation
258
Summary
259
Chapter^ AES-CCMP
261
Introduction
261
Why AES?
262
AES Overview
264
Modes of Operation
264
Offset
Codebook
Mode (OCB)
269
How CCMP Is Used in RSN
269
Steps in Encrypting a Transmission
270
CCMP Header
271
Overview of Implementation
272
Steps in Encrypting an MPDU
273
Decrypting MPDUs
277
Summary
278
Chapter
13
Wi-Fi LAN Coordination: ESS and IBSS
279
Network Coordination
279
ESS Versus IBSS
280
Joining an ESS Network
280
WPA/RSN Information Element
282
Validating the Information Elements
283
Preauthentication Using IEEE
802.
IX
283
IBSS
Ad
-Нос
Networks
285
Summary
289
Part III Wi-Fi Security in the Real World
291
Chapter
14
Public Wireless Hotspots
293
Development of Hotspots
293
Public Wireless Access Defined
294
Barriers to Growth
294
Security Issues in Public Hotspots
296
How Hotspots Are Organized
297
Subscribers
298
Access Points
299
Hotspot Controllers
300
Authentication Server
302
Different Types of Hotspots
303
Airports
303
Hotels
303
Coffee Shops
303
Homes
304
How to Protect Yourself When Using a Hotspot
305
Personal Firewall Software
305
Virtual Private Network (VPN)
306
Summary
308
Chapter
15
Known Attacks: Technical Review
311
Review of Basic Security Mechanisms
311
Confidentiality
3Í2
Integrity
314
Review of Previous IEEE
802.11
Security Mechanisms
316
Confidentiality
316
RC4andWEP
316
Integrity and Authentication
321
Attacks Against the Previous IEEE
802.11
Security
Mechanisms
322
Confidentiality
322
Access Control
329
Authentication
330
Man-in-the-Middle Attacks
331
Management Frames
33
í
ARP
Spoofing
332
Problems
Created by Man-in-the-Middle Attacks
333
802. lx
and
ΕΑΡ
333
PEAP
334
Denial-of-Service Attacks
334
Layer
2
Denial-of-Service Attacks Against All Wi-Fi-Based
Standards
335
WPA Cryptographic Denial-of-Service Attack
335
Summary
336
Chapter
16
Actual Attack Tools
337
Attacker Goals
338
Process
338
Reconnaissance
338
Example Scenarios
345
Planning
346
Collection
348
Analysis
349
Execution
350
Other Tools of Interest
351
Airsnort 351
Airjack 352
Summary
353
Chapter
17
Open Source Implementation Example
355
General Architecture Design Guidelines
355
Protecting a Deployed Network
357
Isolate and Canalize
357
Upgrade Equipment's Firmware to WPA
351
What to Do If You Can't Do Anything
358
Planning to Deploy a WPA Network
359
Deploying the Infrastructure
360
Add a RADIUS Server for IEEE
802.
IX Support
3 60
Use a Public Key Infrastructure for Client Certificates
360
Install Client IEEE
802.
IX Supplicant Software
360
Practical Example Based on Open Source Projects
361
Server Infrastucture
361
Building an Open Source Access Point
3 74
Making It All Work
376
Summary
383
Acknowledgments
384
References and More Information
384
Appendixes
385
Appendix A Overview of the AES Block Cipher
387
Finite Field Arithmetic
388
Addition
389
Subtraction
390
Multiplication
390
Division
391
Galois Field GF()
392
Conclusion
397
Steps in the AES Encryption Process
398
Round Keys
399
Computing the Rounds
401
Decryption
403
Summary of AES
405
Appendix
В
Example Message Modification
407
Appendix
С
Verifying the Integrity of Downloaded Files
411
Checking the MD5 Digest
411
Checking the GPG Signature
412
Acronyms
417
References
421
Index
425 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Edney, Jon |
author_facet | Edney, Jon |
author_role | aut |
author_sort | Edney, Jon |
author_variant | j e je |
building | Verbundindex |
bvnumber | BV023363259 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 200 |
ctrlnum | (OCoLC)52197569 (DE-599)BVBBV023363259 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 3. print. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02247nam a2200565zc 4500</leader><controlfield tag="001">BV023363259</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">080625s2004 xxua||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0321136209</subfield><subfield code="9">0-321-13620-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)52197569</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV023363259</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Edney, Jon</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Real 802.11 security</subfield><subfield code="b">Wi-Fi protected access and 802.11i</subfield><subfield code="c">Jon Edney and William A. Arbaugh</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">3. print.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston ; Munich [u.a.]</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXI, 451 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">IEEE 802</subfield><subfield code="n">11</subfield><subfield code="0">(DE-588)4633968-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IEEE 802.11 (Standard)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless LANs</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Lokales Netz</subfield><subfield code="0">(DE-588)4114441-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Lokales Netz</subfield><subfield code="0">(DE-588)4114441-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">IEEE 802</subfield><subfield code="n">11</subfield><subfield code="0">(DE-588)4633968-1</subfield><subfield code="D">u</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Arbaugh, William A.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016546666&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016546666</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV023363259 |
illustrated | Illustrated |
index_date | 2024-07-02T21:09:53Z |
indexdate | 2024-07-09T21:16:53Z |
institution | BVB |
isbn | 0321136209 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016546666 |
oclc_num | 52197569 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | XXI, 451 S. Ill. |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Addison-Wesley |
record_format | marc |
spelling | Edney, Jon Verfasser aut Real 802.11 security Wi-Fi protected access and 802.11i Jon Edney and William A. Arbaugh 3. print. Boston ; Munich [u.a.] Addison-Wesley 2004 XXI, 451 S. Ill. txt rdacontent n rdamedia nc rdacarrier IEEE 802 11 (DE-588)4633968-1 gnd rswk-swf IEEE 802.11 (Standard) Wireless LANs Security measures Sicherheit (DE-588)4054790-5 gnd rswk-swf Lokales Netz (DE-588)4114441-7 gnd rswk-swf Drahtloses lokales Netz (DE-588)4633975-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Lokales Netz (DE-588)4114441-7 s Sicherheit (DE-588)4054790-5 s DE-604 Drahtloses lokales Netz (DE-588)4633975-9 s 1\p DE-604 Computersicherheit (DE-588)4274324-2 s 2\p DE-604 IEEE 802 11 (DE-588)4633968-1 u 3\p DE-604 Arbaugh, William A. Sonstige oth Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016546666&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Edney, Jon Real 802.11 security Wi-Fi protected access and 802.11i IEEE 802 11 (DE-588)4633968-1 gnd IEEE 802.11 (Standard) Wireless LANs Security measures Sicherheit (DE-588)4054790-5 gnd Lokales Netz (DE-588)4114441-7 gnd Drahtloses lokales Netz (DE-588)4633975-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4633968-1 (DE-588)4054790-5 (DE-588)4114441-7 (DE-588)4633975-9 (DE-588)4274324-2 |
title | Real 802.11 security Wi-Fi protected access and 802.11i |
title_auth | Real 802.11 security Wi-Fi protected access and 802.11i |
title_exact_search | Real 802.11 security Wi-Fi protected access and 802.11i |
title_exact_search_txtP | Real 802.11 security Wi-Fi protected access and 802.11i |
title_full | Real 802.11 security Wi-Fi protected access and 802.11i Jon Edney and William A. Arbaugh |
title_fullStr | Real 802.11 security Wi-Fi protected access and 802.11i Jon Edney and William A. Arbaugh |
title_full_unstemmed | Real 802.11 security Wi-Fi protected access and 802.11i Jon Edney and William A. Arbaugh |
title_short | Real 802.11 security |
title_sort | real 802 11 security wi fi protected access and 802 11i |
title_sub | Wi-Fi protected access and 802.11i |
topic | IEEE 802 11 (DE-588)4633968-1 gnd IEEE 802.11 (Standard) Wireless LANs Security measures Sicherheit (DE-588)4054790-5 gnd Lokales Netz (DE-588)4114441-7 gnd Drahtloses lokales Netz (DE-588)4633975-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | IEEE 802 11 IEEE 802.11 (Standard) Wireless LANs Security measures Sicherheit Lokales Netz Drahtloses lokales Netz Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016546666&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT edneyjon real80211securitywifiprotectedaccessand80211i AT arbaughwilliama real80211securitywifiprotectedaccessand80211i |