0
17 years of experience17 years of Excellence
SUBJECTS
ADV. SEARCH
Indian Books on Discounts
  Hack Proofing Your Wireless Network
 

Hack Proofing Your Wireless Network

by Neal O`Farrell,Tony Bautts,Eric Ouellet (Cissp)

  Price : Rs 450.00
  Your Price : Rs 382.50
Discount
15
In Stock
  The Complete Guide to Protecting Your Wireless Network Traditionally, someone had to be sitting in front of your computer to read your documents, see your email, and play with your settings. Today, however, someone can be sitting in the office next door, a few floors up, or even in the next building, and have the same abilities as if he were in front of your computer. Are you using an 802.11 or Bluetooth device on your computer? Are you using a PDA to communicate with other systems or to get onto the Internet? Are you using a cellular phone to initiate a network connection back to your office? Have you just set up the latest wireless gateway at home? Are you planning on implementing a wireless solution in your office? Then you need Hack Proofing Your Wireless Network.1. Understand the Limitations of Wireless SecurityReview how incomplete standards and changing protocols affect your networks.2. Establish Information Classification ProceduresLearn the 7 steps to establishing a classification system, which provides the first step in the creation of your security standards and policies.3. Understand the Broadcast Nature of WirelessLearn about the most commonly used radio transmission protocols, including FrequencyHopping Spread Spectrum (FHSS), DirectSequence Spread Spectrum (DRSS), and Infrared (IR).4. Find Coverage of Sniffing, Interception, and EavesdroppingSniffing remains one of the most effective techniques in attacking a wireless network. Review sniffing and spoofing tools and protect against unauthorized attacks.5. Design and Deploy a Secure NetworkReview the WEP authentication process and it`s advantages and disadvantages.6. Think Like a HackerUnderstand how hackers choose the tools and equipment required for an attack and see how their techniques like "war driving" can be used against you.7. Read about Intrusion Detection StrategiesWatch for unauthorized traffic and protocols and review popular monitoring products.8. Design and Plan a Successful AuditLearn the types of audits and best practices for auditing and security standards.9. Develop a Wireless Security ChecklistFollow the steps to show what type of equipment and planning will be necessary.10. Register for Your 1 Year UpgradeThe Syngress Solutions upgrade plan protects you from content obsolescence and provides monthly mailings, whitepapers, and more!
 


Credit Cards
Payment accepted by All Major Credit and Debit Cards, Net Banking, Cash Cards, Paytm, UPI, Paypal. Our payment gateways are 100% secure.
Check Delivery
Books of Similar Interest
15%
Cascading Style Sheets: The Definitive Guide
by Meyer
15%
A VHDL Primer, 3rd Edi.
by Bhasker
15%
Biological Modeling and Simulation : A Survey of Practical Models, Algorithms, and Numerical Methods
by SCHWARTZ, RUSSELL
15%
DNS and BIND, 4th Edition
by Paul Albitz,Cricket Liu
18%
Special Edition Using Microsofta® Office 2007
by Ed Bott
Best Book Mart
Support

Call Us Phone : +91-9266663909
Email Us Email : support [at] bestbookmart.com
Working Hours Timing : 10:00 AM to 6:00 PM (Mon-Fri)
Powered By
CCAvenue
SSL Protection