Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Maximum Wireless Security - Cyrus Peikari, Seth Fogie

Maximum Wireless Security

Media-Kombination
408 Seiten
2003
Sams Publishing
978-0-672-32488-8 (ISBN)
CHF 63,95 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
A detailed guide to wireless vulnerabilities written by authors who have first-hand experience with wireless crackers and their techniques.
Maximum Wireless Security is a practical handbook that reveals the techniques and tools crackers use to break into wireless networks, and that details the steps network administrators need to take to secure their systems.

The authors provide information to satisfy the expert's hunger for in-depth information with actual source code, real-world case studies, and step-by-step configuration recipes.

The book includes detailed, hands-on information that is currently unavailable in any printed text -- information that has been gleaned from the authors' work with real wireless hackers ("war drivers"), wireless security developers, and leading security experts.

Dr. Cyrus Peikari finished his formal training with honors in electrical engineering at Southern Methodist University in 1991. For eight years Dr. Peikari taught advanced mathematics at the SMU Learning Enhancement Center in Dallas, Texas. He has also worked as a telecommunications software research and development engineer for Alcatel. Dr. Peikari has developed several award-winning security software programs. He also co-founded DallasCon, the largest annual wireless security conference in the Southwest. You can reach him at cyrus@virusmd.com. Seth Fogie is a former United States Navy nuclear engineer. After retiring from the Navy, Mr. Fogie worked as a technical support specialist for a major Internet service provider, during which time he earned his MCSE. Currently, Mr. Fogie is director of engineering at VirusMD Wireless Security, where he develops next-generation mobile security software. Brett L. Neilson is a network and system engineer with a strong background in the wireless industry. Mr. Neilson has previously worked for Verizon Wireless as a Senior Systems Administrator and RF Field Technician. While at Verizon he worked to develop, deploy, and maintain its national infrastructure. Currently Mr. Neilson works for a leading infosec corporation. As an FCC licensed amateur radio operator, he has worked with various government agencies providing communication assistance and coordination. His broad range of computer and RF skills has led him to perform groundbreaking research in practical wireless security. Mr. Neilson also teaches a series of review courses for the Wireless Security Expert Certification (WSEC). Sten Lannerstrom is product portfolio manager at SmartTrust, a provider of infrastructure software for securing and managing mobile services and devices. Mr. Lannerstrom joined SmartTrust in 1997 (at that time iD2 Technologies) and has more than 22 years of experience in the area of information technology. Mr. Lannerstrom oversees SmartTrust's wireless security portfolio, including the use of smart cards, wireless devices, digital certificates, and biometrics. He holds the CISA (Certified Information Systems Auditor) accreditation.

Introduction. I. WIRELESS FUNDAMENTALS. 1. Wireless Hardware. Access Points. Linksys WAP11. NetGear ME102. Antennas. Radome-Enclosed Yagi Antenna: HyperLink HG2415Y. Parabolic Grid Antenna: HyperLink HG2419G. SigMax Omni-Directional: Signull SMISMCO10. SigMax Circular Yagi: Signull SMISMCY12. TechnoLab Log Periodic Yagi. Wireless NIC. ORiNOCO PC Card. Handheld Devices. Compaq iPAQ. Constructing Your Test Lab. Summary. 2. Wireless Network Protocols. Inside the 802.11 Standard. Inside the 802.11a Standard. Inside the 802.11g Standard. 802.11a Versus 802.11b. Understanding HomeRF. Understanding IrDA. Understanding Bluetooth. Summary. 3. Wireless Programming. HTML/XML/XHTML. WAP/WML/WMLScript. Openwave SDK. i-mode. Java. .NET. Summary. 4. WEP Security. WEP Introduction. RC4 Encryption. How RC4 Works. Summary. II. WIRELESS THREATS. 5. Cracking WEP. WEP Review. Data Analysis. Technical Example. IV Collision. Key Extraction. Summary. 6. Hacking Techniques. Diverse Hacker Attack Methods. Sniffing. Spoofing and Session Hijacking. Understanding Buffer Overflows. Unexpected Input. Denial-of-Service Attacks. Summary. 7. Wireless Attacks. Surveillance. War Driving. Client-to-Client Hacking. Rogue Access Points. Jamming (Denial of Service). Practical WEP Cracking. Summary. 8. Airborne Viruses. Airborne Viruses. Virus Overview. Virus Prevention. Hostile Web Pages and Scripting. Palm OS. Viruses on Windows CE .NET. Handset Viruses. Summary. III. TOOLS OF THE TRADE. 9. Auditing Tools. Ethereal. NetStumbler. Kismet. AirSnort. WEPCrack. Windows XP. AiroPeek NX. Summary. 10. Pocket PC Hacking. Important URLs. Pocket PC Installation. WLAN Drivers. MiniStumbler. CENiffer. Net Force and vxUtil. IBM Wireless Security Auditor. Summary. 11. Wireless Hack Walkthrough. The Test Network. Defining the Goal. Investigation and Discovery. Attack Preparation. Execution. Clean Up. Summary. IV. WIRELESS SECURITY. 12. Securing the WLAN. Access Point-Based Security Measures. Third-Party Security Methods. Funk's Steel-Belted Radius. WLAN Protection Enhancements. Summary. 13. Virtual Private Networks. VPN Review. Tunneling. IPsec. L2TP. Attacks Against VPNs. Deploying VPNs in WLANs. Summary. 14. Intrusion Detection Systems. Log File Monitors. Integrity Monitors. Signature Scanners. IDS Theory. Receiver Operating Characteristic Curves. Hacking Through IDSs. The Future of IDSs. Summary. 15. Wireless Public Key Infrastructure. Public Key Cryptography. Digital Signatures. Certificate Authorities. Wireless PKI Implementation. Transaction Confirmation. Integrity of User Identities. Third-Party Services. WAP PKI. Summary. V. APPENDIXES. Appendix A: Decimal/Hex/Binary Conversion Table. Appendix B: WEPCrack Exploit Code Example. GNU General Public License. Appendix C: References.

Erscheint lt. Verlag 9.1.2003
Verlagsort Indianapolis
Sprache englisch
Maße 188 x 232 mm
Gewicht 695 g
Themenwelt Mathematik / Informatik Informatik Datenbanken
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Technik Nachrichtentechnik
ISBN-10 0-672-32488-1 / 0672324881
ISBN-13 978-0-672-32488-8 / 9780672324888
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
nach DSGVO und BDSG

von Andreas Schaupp

Druckwerk (2023)
Deutscher Apotheker Verlag
CHF 72,95
Datenschutz (Kombi-Ausgabe), Mitarbeiter-Merkblatt Datenschutz und …
Media-Kombination (2022)
Forum Verlag Herkert
CHF 419,95