My Account Details

ISBN10: 0071429174 | ISBN13: 9780071429177

Step 1 . Download Adobe Digital Editions to your PC or Mac desktop/laptop.
Step 2. Register and authorize your Adobe ID (optional). To access your eBook on multiple devices, first create an Adobe ID at account.adobe.com. Then, open Adobe Digital Editions, go to the Help menu, and select "Authorize Computer" to link your Adobe ID.
Step 3. Open Your eBook. Use Adobe Digital Editions to open the file. If the eBook doesn’t open, contact customer service for assistance.
By following this resource, corporations can go wireless and still protect mission-critical data. Top corporate security consultant Stewart Miller covers security for Windows, Linux, Macs, Palms, and other PDAs and shows how to prevent breaches caused by weak encryption protocols. * Review security approaches for the different standards currently competing for the U.S. market * Addresses data compromise, unauthorized access, and denial of service--all critical to WLAN users * Covers the 802.11 IEEE standard in regards to security, performance, and throughput * Discusses encryption and privacy through the WEP (Wired Equivalent Privacy) protocol
Chapter 1: Introduction to the Wireless LAN Industry Security StandardsChapter 2: TechnologyChapter 3: Wireless LAN Security FactorsChapter 4: Issues in Wireless SecurityChapter 5: The 802.11 Standard DefinedChapter 6: Wi-Fi Security InfrastructureChapter 7: 802.11 Encryption: Wired EquivalentChapter 8: Unauthorized Access & PrivacyChapter 9: Open System AuthenticationChapter 10: Direct Sequence Spread SpectrumChapter 11: Wi-Fi Equipment IssuesChapter 12: Cross-Platform Wireless User SecurityChapter 13: Security Breach VulnerabilitiesChapter 14: Access Control SchemesChapter 15: Wireless Laptop Users (PC & Mac)Chapter 16: Administrative SecurityChapter 17: Security Issues for Wireless Applications (Wireless PDAs)Chapter 18: The Future of Wi-Fi Security? Index
Chapter 3: Wireless LAN Security FactorsChapter 4: Issues in Wireless SecurityChapter 5: The 802.11 Standard DefinedChapter 6: Wi-Fi Security InfrastructureChapter 7: 802.11 Encryption: Wired EquivalentChapter 8: Unauthorized Access & PrivacyChapter 9: Open System AuthenticationChapter 10: Direct Sequence Spread SpectrumChapter 11: Wi-Fi Equipment IssuesChapter 12: Cross-Platform Wireless User SecurityChapter 13: Security Breach VulnerabilitiesChapter 14: Access Control SchemesChapter 15: Wireless Laptop Users (PC & Mac)Chapter 16: Administrative SecurityChapter 17: Security Issues for Wireless Applications (Wireless PDAs)Chapter 18: The Future of Wi-Fi Security? Index
Chapter 5: The 802.11 Standard DefinedChapter 6: Wi-Fi Security InfrastructureChapter 7: 802.11 Encryption: Wired EquivalentChapter 8: Unauthorized Access & PrivacyChapter 9: Open System AuthenticationChapter 10: Direct Sequence Spread SpectrumChapter 11: Wi-Fi Equipment IssuesChapter 12: Cross-Platform Wireless User SecurityChapter 13: Security Breach VulnerabilitiesChapter 14: Access Control SchemesChapter 15: Wireless Laptop Users (PC & Mac)Chapter 16: Administrative SecurityChapter 17: Security Issues for Wireless Applications (Wireless PDAs)Chapter 18: The Future of Wi-Fi Security? Index
Chapter 7: 802.11 Encryption: Wired EquivalentChapter 8: Unauthorized Access & PrivacyChapter 9: Open System AuthenticationChapter 10: Direct Sequence Spread SpectrumChapter 11: Wi-Fi Equipment IssuesChapter 12: Cross-Platform Wireless User SecurityChapter 13: Security Breach VulnerabilitiesChapter 14: Access Control SchemesChapter 15: Wireless Laptop Users (PC & Mac)Chapter 16: Administrative SecurityChapter 17: Security Issues for Wireless Applications (Wireless PDAs)Chapter 18: The Future of Wi-Fi Security? Index
Chapter 9: Open System AuthenticationChapter 10: Direct Sequence Spread SpectrumChapter 11: Wi-Fi Equipment IssuesChapter 12: Cross-Platform Wireless User SecurityChapter 13: Security Breach VulnerabilitiesChapter 14: Access Control SchemesChapter 15: Wireless Laptop Users (PC & Mac)Chapter 16: Administrative SecurityChapter 17: Security Issues for Wireless Applications (Wireless PDAs)Chapter 18: The Future of Wi-Fi Security? Index
Chapter 11: Wi-Fi Equipment IssuesChapter 12: Cross-Platform Wireless User SecurityChapter 13: Security Breach VulnerabilitiesChapter 14: Access Control SchemesChapter 15: Wireless Laptop Users (PC & Mac)Chapter 16: Administrative SecurityChapter 17: Security Issues for Wireless Applications (Wireless PDAs)Chapter 18: The Future of Wi-Fi Security? Index
Chapter 13: Security Breach VulnerabilitiesChapter 14: Access Control SchemesChapter 15: Wireless Laptop Users (PC & Mac)Chapter 16: Administrative SecurityChapter 17: Security Issues for Wireless Applications (Wireless PDAs)Chapter 18: The Future of Wi-Fi Security? Index
Chapter 15: Wireless Laptop Users (PC & Mac)Chapter 16: Administrative SecurityChapter 17: Security Issues for Wireless Applications (Wireless PDAs)Chapter 18: The Future of Wi-Fi Security? Index
Chapter 17: Security Issues for Wireless Applications (Wireless PDAs)Chapter 18: The Future of Wi-Fi Security? Index
Index
Need support? We're here to help - Get real-world support and resources every step of the way.