How to Cheat at Securing a Wireless Network
2008-12-02 00:50
351 查看
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.csdn.net/topmvp - topmvp
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors:
*Denial of service (DoS) and other network layer attacks
*Unauthorized access across the perimeter and within the organization Application layer intrusions and attacks, both from within and outside the network Extended connectivity through remote access and extranets
*An increase in unmanaged or ill-managed endpoint devices
*New applications like VoIP, instant messaging, and peer-to-peer
This book provides the busy network administrator with best-practice solutions address these threats and to maintain a secure and accessible wireless network. The book endorses the principle that the best strategy is to deploy multiple layers of security, each reinforcing the other. Yet it never strays from its emphasis on the practical; that any tool or methodology that is deployed must work reliably, allow sufficient access, and require a minimal amount of maintenance
http://rapidshare.com/files/52842313/1597490873.zip
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors:
*Denial of service (DoS) and other network layer attacks
*Unauthorized access across the perimeter and within the organization Application layer intrusions and attacks, both from within and outside the network Extended connectivity through remote access and extranets
*An increase in unmanaged or ill-managed endpoint devices
*New applications like VoIP, instant messaging, and peer-to-peer
This book provides the busy network administrator with best-practice solutions address these threats and to maintain a secure and accessible wireless network. The book endorses the principle that the best strategy is to deploy multiple layers of security, each reinforcing the other. Yet it never strays from its emphasis on the practical; that any tool or methodology that is deployed must work reliably, allow sufficient access, and require a minimal amount of maintenance
http://rapidshare.com/files/52842313/1597490873.zip
相关文章推荐
- How to Cheat at Securing a Wireless Network
- How to Cheat at Securing SQL Server 2005 (Paperback), Aug.2007.eBook-BBL
- How to Cheat at Securing Linux
- How to Cheat at Deploying and Securing RFID
- How to Cheat at Designing Security for a Windows Server 2003 Network
- How to Cheat at Securing SQL Server 2005
- How to Cheat at Deploying and Securing RFID (How to Cheat) (Paperback), Oct.2007.eBook-BBL
- How to Cheat at Managing Information Security
- How to Cheat at Voip Security
- How to Cheat at Windows System Administration Using Command Line Scripts
- How to Cheat at IT Project Management
- How to Cheat at Configuring VmWare ESX Server (Paperback), Jun.2007.eBook-BBL
- How to Cheat at Configuring Exchange Server 2007: Including Outlook Web, Mobile, and Voice Access
- How to Cheat at Configuring Open Source Security Tools
- How to Cheat at Configuring VmWare ESX Server
- How to Cheat at Administering Office Communicator 2007
- How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure
- How to Cheat at Microsoft Vista Administration
- How to Disable Validating Identity on Wireless Network