How to cheat at securing a wireless network:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, Mass.
Syngress
2006
|
Schriftenreihe: | How to Cheat Ser
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes index Introduction to wireless : from past to present -- Wireless security -- Dangers of wireless devices in the workplace -- WLAN rogue access point detection and mitigation -- Wireless LAN VLANs -- Designing a wireless network -- Wireless network architecture and design -- Monitoring and intrusion detection -- Designing a wireless enterprise network : hospital case study -- Designing a wireless industrial network : retail case study -- Designing a wireless home network : home office case study -- Wireless penetration testing Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless network With the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the networks vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users. A practical product and technology specific guideline to securing a wireless networks for the busy System Administrator Takes a simplified multi-layered approach into easily deployed plans for a straight forward understanding Does not bog you down with history, but offers practical useful information for today |
Beschreibung: | 1 Online-Ressource (xxv, 453 pages) |
ISBN: | 0080508227 1281078336 1429416599 1597490873 9780080508221 9781281078339 9781429416597 9781597490870 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043155261 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2006 |||| o||u| ||||||eng d | ||
020 | |a 0080508227 |c electronic bk. |9 0-08-050822-7 | ||
020 | |a 1281078336 |9 1-281-07833-6 | ||
020 | |a 1429416599 |c electronic bk. |9 1-4294-1659-9 | ||
020 | |a 1597490873 |9 1-59749-087-3 | ||
020 | |a 9780080508221 |c electronic bk. |9 978-0-08-050822-1 | ||
020 | |a 9781281078339 |9 978-1-281-07833-9 | ||
020 | |a 9781429416597 |c electronic bk. |9 978-1-4294-1659-7 | ||
020 | |a 9781597490870 |9 978-1-59749-087-0 | ||
035 | |a (OCoLC)76968243 | ||
035 | |a (DE-599)BVBBV043155261 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Hurley, Chris |e Verfasser |4 aut | |
245 | 1 | 0 | |a How to cheat at securing a wireless network |c Chris Hurley [and others] |
264 | 1 | |a Rockland, Mass. |b Syngress |c 2006 | |
300 | |a 1 Online-Ressource (xxv, 453 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a How to Cheat Ser | |
500 | |a Includes index | ||
500 | |a Introduction to wireless : from past to present -- Wireless security -- Dangers of wireless devices in the workplace -- WLAN rogue access point detection and mitigation -- Wireless LAN VLANs -- Designing a wireless network -- Wireless network architecture and design -- Monitoring and intrusion detection -- Designing a wireless enterprise network : hospital case study -- Designing a wireless industrial network : retail case study -- Designing a wireless home network : home office case study -- Wireless penetration testing | ||
500 | |a Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless network With the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the networks vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users. A practical product and technology specific guideline to securing a wireless networks for the busy System Administrator Takes a simplified multi-layered approach into easily deployed plans for a straight forward understanding Does not bog you down with history, but offers practical useful information for today | ||
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Wireless communication systems / Security measures | |
650 | 4 | |a Wireless LANs / Security measures | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Wireless LANs / Security measures |2 fast | |
650 | 4 | |a Wireless LANs |x Security measures | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173422 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028579452 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173422 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173422 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175619647340544 |
---|---|
any_adam_object | |
author | Hurley, Chris |
author_facet | Hurley, Chris |
author_role | aut |
author_sort | Hurley, Chris |
author_variant | c h ch |
building | Verbundindex |
bvnumber | BV043155261 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)76968243 (DE-599)BVBBV043155261 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03806nmm a2200541zc 4500</leader><controlfield tag="001">BV043155261</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2006 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080508227</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-050822-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281078336</subfield><subfield code="9">1-281-07833-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1429416599</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4294-1659-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490873</subfield><subfield code="9">1-59749-087-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080508221</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-050822-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281078339</subfield><subfield code="9">978-1-281-07833-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781429416597</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4294-1659-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490870</subfield><subfield code="9">978-1-59749-087-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)76968243</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043155261</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hurley, Chris</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">How to cheat at securing a wireless network</subfield><subfield code="c">Chris Hurley [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="b">Syngress</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxv, 453 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">How to Cheat Ser</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Introduction to wireless : from past to present -- Wireless security -- Dangers of wireless devices in the workplace -- WLAN rogue access point detection and mitigation -- Wireless LAN VLANs -- Designing a wireless network -- Wireless network architecture and design -- Monitoring and intrusion detection -- Designing a wireless enterprise network : hospital case study -- Designing a wireless industrial network : retail case study -- Designing a wireless home network : home office case study -- Wireless penetration testing</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless network With the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the networks vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users. A practical product and technology specific guideline to securing a wireless networks for the busy System Administrator Takes a simplified multi-layered approach into easily deployed plans for a straight forward understanding Does not bog you down with history, but offers practical useful information for today</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless LANs / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless LANs / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless LANs</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173422</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028579452</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173422</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173422</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043155261 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:19:10Z |
institution | BVB |
isbn | 0080508227 1281078336 1429416599 1597490873 9780080508221 9781281078339 9781429416597 9781597490870 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028579452 |
oclc_num | 76968243 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxv, 453 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Syngress |
record_format | marc |
series2 | How to Cheat Ser |
spelling | Hurley, Chris Verfasser aut How to cheat at securing a wireless network Chris Hurley [and others] Rockland, Mass. Syngress 2006 1 Online-Ressource (xxv, 453 pages) txt rdacontent c rdamedia cr rdacarrier How to Cheat Ser Includes index Introduction to wireless : from past to present -- Wireless security -- Dangers of wireless devices in the workplace -- WLAN rogue access point detection and mitigation -- Wireless LAN VLANs -- Designing a wireless network -- Wireless network architecture and design -- Monitoring and intrusion detection -- Designing a wireless enterprise network : hospital case study -- Designing a wireless industrial network : retail case study -- Designing a wireless home network : home office case study -- Wireless penetration testing Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless network With the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the networks vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users. A practical product and technology specific guideline to securing a wireless networks for the busy System Administrator Takes a simplified multi-layered approach into easily deployed plans for a straight forward understanding Does not bog you down with history, but offers practical useful information for today Computer networks / Security measures Wireless communication systems / Security measures Wireless LANs / Security measures COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Wireless LANs / Security measures fast Wireless LANs Security measures http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173422 Aggregator Volltext |
spellingShingle | Hurley, Chris How to cheat at securing a wireless network Computer networks / Security measures Wireless communication systems / Security measures Wireless LANs / Security measures COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Wireless LANs / Security measures fast Wireless LANs Security measures |
title | How to cheat at securing a wireless network |
title_auth | How to cheat at securing a wireless network |
title_exact_search | How to cheat at securing a wireless network |
title_full | How to cheat at securing a wireless network Chris Hurley [and others] |
title_fullStr | How to cheat at securing a wireless network Chris Hurley [and others] |
title_full_unstemmed | How to cheat at securing a wireless network Chris Hurley [and others] |
title_short | How to cheat at securing a wireless network |
title_sort | how to cheat at securing a wireless network |
topic | Computer networks / Security measures Wireless communication systems / Security measures Wireless LANs / Security measures COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Wireless LANs / Security measures fast Wireless LANs Security measures |
topic_facet | Computer networks / Security measures Wireless communication systems / Security measures Wireless LANs / Security measures COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Wireless LANs Security measures |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173422 |
work_keys_str_mv | AT hurleychris howtocheatatsecuringawirelessnetwork |