Catálogo de publicaciones - libros
Guide to Wireless Network Security
John R. Vacca
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
No disponibles.
Disponibilidad
| Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
|---|---|---|---|---|
| No detectada | 2006 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-0-387-95425-7
ISBN electrónico
978-0-387-29845-0
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2006
Información sobre derechos de publicación
© Springer Science+Business Media, LLC 2006
Cobertura temática
Tabla de contenidos
Ensuring Site Integrity
John R. Vacca
Secure wireless networks can be deployed quickly and cost effectively once the architecture and hardware are procured. However, complexity increases as the amount of serviceable users and coverage area grows. When users must “roam” between different access points, new criteria enter into the equation, due to the complexities involved in configuring a wireless network that provides users the mobility they desire. Finally, when these factors are taken into consideration, a wireless network can be designed with appropriate countermeasures, to provide both mobility and security for wireless networks in hostile environments.
Part V - Maintaining Wireless Network Security | Pp. 359-367
Defensive Wireless Network Security Strategies for Governments and Industry Groups
John R. Vacca
Enterprises and users benefit when access to public wireless web servers is safe and convenient and when the enterprise’s electronic information resources are secure, reliable, and available. As is the case with all other aspects of remote access to enterprise resources, the use of public wireless web servers entails risks as well as benefits. Finally, these risks and benefits must be managed through careful planning, and through the implementation of guidelines, for the secure operation of public wireless web servers.
Part VI - Information Warfare Countermeasures: The Wireless Network Security Solution | Pp. 371-407
The Information Warfare Wireless Network Security Arsenal and Tactics of the Military
John R. Vacca
Like most advances, wireless LANs and WWANs pose both opportunities and risks. The technology can represent a powerful complement to an enterprise’s networking capabilities, enabling increased employee productivity and reducing IT costs. To minimize the attendant risks, IT administrators can implement a range of measures, including establishment of wireless security policies and practices, as well as implementation of various LAN and WAN design and implementation measures. Finally, achieving this balance of opportunity and risk allows enterprises to confidently implement wireless LANs and realize the benefits this increasingly viable technology offers.
Part VI - Information Warfare Countermeasures: The Wireless Network Security Solution | Pp. 409-457
The Information Warfare Wireless Network Security Arsenal and Tactics of Terrorists and Rogues
John R. Vacca
This chapter began with some fundamental concepts of wireless network security. The chapter outlined the main security risks for an enterprise to deploy intranets and extranets. The chapter further described some security vulnerabilities in the TCP/IP protocol suite that gives attackers many opportunities for malicious attacks on Internet connected computers. Finally, the chapter also presented the methods and techniques that attackers use to circumvent wireless network security.
Part VI - Information Warfare Countermeasures: The Wireless Network Security Solution | Pp. 459-517
The Information Warfare Wireless Network Security Arsenal and Tactics of Private Enterprises
John R. Vacca
This chapter began with some fundamental concepts of wireless network security. The chapter outlined the main security risks for an enterprise to deploy intranets and extranets. The chapter further described some security vulnerabilities in the TCP/IP protocol suite that gives attackers many opportunities for malicious attacks on Internet connected computers. Finally, the chapter also presented the methods and techniques that attackers use to circumvent wireless network security.
Part VI - Information Warfare Countermeasures: The Wireless Network Security Solution | Pp. 519-556
The Information Warfare Wireless Network Security Arsenal of the Future
John R. Vacca
In this chapter, you’ve discovered how to find wireless networks, gain access to them even if they’re using WEP encryption, find vulnerable systems and ports, and use various utilities to assist you in those endeavors. This is mostly what a hacker would do to gain access to your systems. Finally, by knowing your hacker, you can then successfully implement strategies to circumvent these methods.
Part VI - Information Warfare Countermeasures: The Wireless Network Security Solution | Pp. 557-599
Wireless Network Security Surveillance Tools for Information Warfare of the Future
John R. Vacca
By now, the rationale behind incorporating a strong wireless network security solution into your enterprise insurance plan is clear. In today’s digital marketplace, with new and more volatile wireless network threats emerging every week, it’s protection rather than reaction that will preserve your bottom line. If strong protection is the answer, the question must then be: what kind?
Part VI - Information Warfare Countermeasures: The Wireless Network Security Solution | Pp. 601-637
Civilian Casualties: The Victims and Refugees of Information Warfare Wireless Network Security
John R. Vacca
Wireless software applications can realize a level of security that satisfies the needs of most enterprises, assuming you plan effective solutions and have security policies in place that enforce conformance to security mechanisms. Keep in mind, however, that the strongest authentication and data encryption won’t keep a hacker from merely looking over the shoulder of someone using a wireless device in a public place. So don’t forget to educate users on this simple hacker tactic as well as the more sophisticated ones.
Part VI - Information Warfare Countermeasures: The Wireless Network Security Solution | Pp. 639-680
Providing Wireless Network Security Solutions for ISP Intranet, Internet and E-Commerce
John R. Vacca
This chapter began with some fundamental concepts of wireless network security. The chapter outlined the main security risks for an enterprise to deploy intranets and extranets. The chapter further described some security vulnerabilities in the TCP/IP protocol suite that gives attackers many opportunities for malicious attacks on Internet connected computers. Finally, the chapter also presented the methods and techniques that attackers use to circumvent wireless network security.
Part VII - Wireless Network Security Solutions and Future Directions | Pp. 683-733
Enhancing Wireless Web Server Security
John R. Vacca
Enterprises and users benefit when access to public wireless web servers is safe and convenient and when the enterprise’s electronic information resources are secure, reliable, and available. As is the case with all other aspects of remote access to enterprise resources, the use of public wireless web servers entails risks as well as benefits. Finally, these risks and benefits must be managed through careful planning, and through the implementation of guidelines, for the secure operation of public wireless web servers.
Part VII - Wireless Network Security Solutions and Future Directions | Pp. 735-743