[ Pobierz całość w formacie PDF ]
802.11 Security
By
Bob Fleck
,
Bruce Potter
Publisher: O'Reilly
Pub Date: December 2002
ISBN: 0-596-00290-4
Pages: 208
Beginning with an introduction to 802.11b in general,
802.11 Security
gives
you a broad basis in theory and practice of wireless security, dispelling some
of the myths along the way. In doing so, they provide you with the technical
grounding required to think about how the rest of the book applies to your
specific needs and situations. If you are a network, security, or systems
engineer, or anyone interested in deploying 802.11b--based systems, you'll
want this book beside you every step of the way
Copyright
Preface
Assumptions About the Reader
Scope of the Book
Conventions Used in This Book
Other Sources of Information
We'd Like to Hear from You
Acknowledgments
Part I: 802.11 Security Basics
Chapter 1. A Wireless World
Section 1.1. What Is
Wireless?
Section 1.2. Radio
Transmission
Section 1.3. Inherent
Insecurity
Section 1.4. 802.11
Section 1.5. Structure
of 802.11 MAC
Section 1.6. WEP
Section 1.7. Problems
with WEP
Section 1.8. Is It
Hopeless?
Chapter 2. Attacks and Risks
Section 2.1. An
Example Network
Section 2.2. Denial-
of-Service Attacks
Section 2.3. Man-in-
the-Middle Attacks
Section 2.4. Illicit Use
Section 2.5. Wireless
Risks
Section 2.6. Knowing
Is Half the Battle
Part II: Station Security
Chapter 3. Station Security
Section 3.1. Client
Security Goals
Section 3.2. Audit
Logging
Section 3.3. Security
Updates
Chapter 4. FreeBSD Station Security
Section 4.1. FreeBSD
Client Setup
Chapter 5. Linux Station Security
Section 5.1. Linux
Client Setup
Section 5.2. Kernel
Configuration
Section 5.3. OS
Protection
Section 5.4. Audit
Logging
Section 5.5. Secure
Communication
Chapter 6. OpenBSD Station Security
Section 6.1. OpenBSD
Client Setup
Section 6.2. Kernel
Configuration
Section 6.3. OS
Protection
Section 6.4. Audit
Logging
Chapter 7. Mac OS X Station Security
Section 7.2. OS
Protection
Section 7.3. Audit
Logging
Chapter 8. Windows Station Security
Section 8.2. OS
Protection
Section 8.3. Audit
Logging
Section 8.4. Secure
Communication
Part III: Access Point Security
Chapter 9. Setting Up an Access Point
Section 9.2. Setting
Up a Linux Access
Point
Section 9.3. Setting
Up a FreeBSD Access
Point
Section 9.4. Setting
Up an OpenBSD
Section 7.1. Mac OS X
Setup
Section 8.1. Windows
Client Setup
Section 9.1. General
Access Point Security
Access Point
Section 9.5. Taking It
to the Gateway
Part IV: Gateway Security
Chapter 10. Gateway Security
Section
10.1. Gateway
Architecture
Section 10.2. Secure
Installation
Section 10.3. Firewall
Rule Creation
Section 10.4. Audit
Logging
Chapter 11. Building a Linux Gateway
Section 11.1. Laying
Out the Network
Section 11.2. Building
the Gateway
Section
11.3. Configuring
Network Interfaces
Section 11.4. Building
the Firewall Rules
Section 11.5. MAC
Address Filtering
Section 11.6. DHCP
Section 11.7. DNS
Section 11.8. Static
ARP
Section 11.9. Audit
Logging
Section
[ Pobierz całość w formacie PDF ]
zanotowane.pl doc.pisz.pl pdf.pisz.pl jajeczko.pev.pl
802.11 Security
By
Bob Fleck
,
Bruce Potter
Publisher: O'Reilly
Pub Date: December 2002
ISBN: 0-596-00290-4
Pages: 208
Beginning with an introduction to 802.11b in general,
802.11 Security
gives
you a broad basis in theory and practice of wireless security, dispelling some
of the myths along the way. In doing so, they provide you with the technical
grounding required to think about how the rest of the book applies to your
specific needs and situations. If you are a network, security, or systems
engineer, or anyone interested in deploying 802.11b--based systems, you'll
want this book beside you every step of the way
Copyright
Preface
Assumptions About the Reader
Scope of the Book
Conventions Used in This Book
Other Sources of Information
We'd Like to Hear from You
Acknowledgments
Part I: 802.11 Security Basics
Chapter 1. A Wireless World
Section 1.1. What Is
Wireless?
Section 1.2. Radio
Transmission
Section 1.3. Inherent
Insecurity
Section 1.4. 802.11
Section 1.5. Structure
of 802.11 MAC
Section 1.6. WEP
Section 1.7. Problems
with WEP
Section 1.8. Is It
Hopeless?
Chapter 2. Attacks and Risks
Section 2.1. An
Example Network
Section 2.2. Denial-
of-Service Attacks
Section 2.3. Man-in-
the-Middle Attacks
Section 2.4. Illicit Use
Section 2.5. Wireless
Risks
Section 2.6. Knowing
Is Half the Battle
Part II: Station Security
Chapter 3. Station Security
Section 3.1. Client
Security Goals
Section 3.2. Audit
Logging
Section 3.3. Security
Updates
Chapter 4. FreeBSD Station Security
Section 4.1. FreeBSD
Client Setup
Chapter 5. Linux Station Security
Section 5.1. Linux
Client Setup
Section 5.2. Kernel
Configuration
Section 5.3. OS
Protection
Section 5.4. Audit
Logging
Section 5.5. Secure
Communication
Chapter 6. OpenBSD Station Security
Section 6.1. OpenBSD
Client Setup
Section 6.2. Kernel
Configuration
Section 6.3. OS
Protection
Section 6.4. Audit
Logging
Chapter 7. Mac OS X Station Security
Section 7.2. OS
Protection
Section 7.3. Audit
Logging
Chapter 8. Windows Station Security
Section 8.2. OS
Protection
Section 8.3. Audit
Logging
Section 8.4. Secure
Communication
Part III: Access Point Security
Chapter 9. Setting Up an Access Point
Section 9.2. Setting
Up a Linux Access
Point
Section 9.3. Setting
Up a FreeBSD Access
Point
Section 9.4. Setting
Up an OpenBSD
Section 7.1. Mac OS X
Setup
Section 8.1. Windows
Client Setup
Section 9.1. General
Access Point Security
Access Point
Section 9.5. Taking It
to the Gateway
Part IV: Gateway Security
Chapter 10. Gateway Security
Section
10.1. Gateway
Architecture
Section 10.2. Secure
Installation
Section 10.3. Firewall
Rule Creation
Section 10.4. Audit
Logging
Chapter 11. Building a Linux Gateway
Section 11.1. Laying
Out the Network
Section 11.2. Building
the Gateway
Section
11.3. Configuring
Network Interfaces
Section 11.4. Building
the Firewall Rules
Section 11.5. MAC
Address Filtering
Section 11.6. DHCP
Section 11.7. DNS
Section 11.8. Static
ARP
Section 11.9. Audit
Logging
Section
[ Pobierz całość w formacie PDF ]