Guide to Wireless Network Security

  • John R. Vacca

Table of contents

  1. Front Matter
    Pages i-xxiii
  2. Overview of Wireless Network Security Technology

  3. Designing Wireless Network Security

  4. Planning for Wireless Network Security

    1. Front Matter
      Pages 213-213
  5. Installing and Deploying Wireless Network Security

    1. Front Matter
      Pages 261-261
    2. Pages 263-269

About this book

Introduction

The steady growth of WiFi in the enterprise demands that corporate IT teams learn and adopt new security methodologies tailored to the unique requirements and weaknesses of wireless networks. Network and security staff must first evaluate a potentially confusing set of authentication and encryption mechanisms to be used in the network. Depending on the security selected, IT will then need to establish and document the enterprise WLAN security policy, including mechanisms to validate user compliance and monitor for inherent network vulnerabilities. With a defined policy in place, IT staff can turn their attentions to protecting the network from snooping and an ever-expanding list of wireless attacks. The Guide to Wireless Network Security addresses each of these areas in detail and identifies the real-world best practices needed to deploy and maintain a secure wireless network.

Guide to Wireless Network Security is an authoritative, clearly presented guide to key foundation topics and technology frameworks for designing and maintaining secure, reliable operations. From basic concepts to designing principles to deployment, all critical concepts and phases are clearly explained and presented. This guide includes coverage of wireless security testing techniques and prevention techniques for intrusion (attacks).

Guide to Wireless Network Security is designed for a professional audience composed of researchers and practitioners in industry and wireless networks administrators. This book is also suitable for graduate-level students in computer science and electrical engineering.

Keywords

Access Firewall Information Technology (IT) Internet Intranet Standards Wireless Wireless LAN information installatioin maintenance network network security performance security

Authors and affiliations

  • John R. Vacca
    • 1
  1. 1.Pomeroy

Bibliographic information

  • DOI https://doi.org/10.1007/978-0-387-29845-0
  • Copyright Information Springer Science+Business Media, LLC 2006
  • Publisher Name Springer, Boston, MA
  • eBook Packages Computer Science
  • Print ISBN 978-0-387-95425-7
  • Online ISBN 978-0-387-29845-0
  • About this book