Wi-Fi Security
Step 1. Download Adobe Digital Editions Both PC and Mac users will need to download Adobe Digital Editions to access their eBook. You can download Adobe Digital Editions at Adobe's website here.
Step 2. Register an Adobe ID if you do not already have one. (This step is optional, but allows you to open the file on multiple devices) Visit account.Adobe.com to register your Adobe account.
Step 3: Authorize Adobe Digital Editions using your Adobe ID. In Adobe Digital Editions, go to the Help menu. Choose “Authorize Computer.”
Step 4: Open your file with Adobe Digital Editions. Once you’ve linked your Adobe Digital Editions with your Adobe ID, you should be able to access your eBook on any device which supports Adobe Digital Editions and is authorized with your ID. If your eBook does not open in Adobe Digital Editions upon download, please contact customer service
Chapter 1: Introduction to the Wireless LAN Industry Security StandardsChapter 2: TechnologyChapter 3: Wireless LAN Security FactorsChapter 4: Issues in Wireless SecurityChapter 5: The 802.11 Standard DefinedChapter 6: Wi-Fi Security InfrastructureChapter 7: 802.11 Encryption: Wired EquivalentChapter 8: Unauthorized Access & PrivacyChapter 9: Open System AuthenticationChapter 10: Direct Sequence Spread SpectrumChapter 11: Wi-Fi Equipment IssuesChapter 12: Cross-Platform Wireless User SecurityChapter 13: Security Breach VulnerabilitiesChapter 14: Access Control SchemesChapter 15: Wireless Laptop Users (PC & Mac)Chapter 16: Administrative SecurityChapter 17: Security Issues for Wireless Applications (Wireless PDAs)Chapter 18: The Future of Wi-Fi Security? Index
Chapter 3: Wireless LAN Security FactorsChapter 4: Issues in Wireless SecurityChapter 5: The 802.11 Standard DefinedChapter 6: Wi-Fi Security InfrastructureChapter 7: 802.11 Encryption: Wired EquivalentChapter 8: Unauthorized Access & PrivacyChapter 9: Open System AuthenticationChapter 10: Direct Sequence Spread SpectrumChapter 11: Wi-Fi Equipment IssuesChapter 12: Cross-Platform Wireless User SecurityChapter 13: Security Breach VulnerabilitiesChapter 14: Access Control SchemesChapter 15: Wireless Laptop Users (PC & Mac)Chapter 16: Administrative SecurityChapter 17: Security Issues for Wireless Applications (Wireless PDAs)Chapter 18: The Future of Wi-Fi Security? Index
Chapter 5: The 802.11 Standard DefinedChapter 6: Wi-Fi Security InfrastructureChapter 7: 802.11 Encryption: Wired EquivalentChapter 8: Unauthorized Access & PrivacyChapter 9: Open System AuthenticationChapter 10: Direct Sequence Spread SpectrumChapter 11: Wi-Fi Equipment IssuesChapter 12: Cross-Platform Wireless User SecurityChapter 13: Security Breach VulnerabilitiesChapter 14: Access Control SchemesChapter 15: Wireless Laptop Users (PC & Mac)Chapter 16: Administrative SecurityChapter 17: Security Issues for Wireless Applications (Wireless PDAs)Chapter 18: The Future of Wi-Fi Security? Index
Chapter 7: 802.11 Encryption: Wired EquivalentChapter 8: Unauthorized Access & PrivacyChapter 9: Open System AuthenticationChapter 10: Direct Sequence Spread SpectrumChapter 11: Wi-Fi Equipment IssuesChapter 12: Cross-Platform Wireless User SecurityChapter 13: Security Breach VulnerabilitiesChapter 14: Access Control SchemesChapter 15: Wireless Laptop Users (PC & Mac)Chapter 16: Administrative SecurityChapter 17: Security Issues for Wireless Applications (Wireless PDAs)Chapter 18: The Future of Wi-Fi Security? Index
Chapter 9: Open System AuthenticationChapter 10: Direct Sequence Spread SpectrumChapter 11: Wi-Fi Equipment IssuesChapter 12: Cross-Platform Wireless User SecurityChapter 13: Security Breach VulnerabilitiesChapter 14: Access Control SchemesChapter 15: Wireless Laptop Users (PC & Mac)Chapter 16: Administrative SecurityChapter 17: Security Issues for Wireless Applications (Wireless PDAs)Chapter 18: The Future of Wi-Fi Security? Index
Chapter 11: Wi-Fi Equipment IssuesChapter 12: Cross-Platform Wireless User SecurityChapter 13: Security Breach VulnerabilitiesChapter 14: Access Control SchemesChapter 15: Wireless Laptop Users (PC & Mac)Chapter 16: Administrative SecurityChapter 17: Security Issues for Wireless Applications (Wireless PDAs)Chapter 18: The Future of Wi-Fi Security? Index
Chapter 13: Security Breach VulnerabilitiesChapter 14: Access Control SchemesChapter 15: Wireless Laptop Users (PC & Mac)Chapter 16: Administrative SecurityChapter 17: Security Issues for Wireless Applications (Wireless PDAs)Chapter 18: The Future of Wi-Fi Security? Index
Chapter 15: Wireless Laptop Users (PC & Mac)Chapter 16: Administrative SecurityChapter 17: Security Issues for Wireless Applications (Wireless PDAs)Chapter 18: The Future of Wi-Fi Security? Index
Chapter 17: Security Issues for Wireless Applications (Wireless PDAs)Chapter 18: The Future of Wi-Fi Security? Index
Index
By following this resource, corporations can go wireless and still protect mission-critical data. Top corporate security consultant Stewart Miller covers security for Windows, Linux, Macs, Palms, and other PDAs and shows how to prevent breaches caused by weak encryption protocols.
* Review security approaches for the different standards currently competing for the U.S. market
* Addresses data compromise, unauthorized access, and denial of service--all critical to WLAN users
* Covers the 802.11 IEEE standard in regards to security, performance, and throughput
* Discusses encryption and privacy through the WEP (Wired Equivalent Privacy) protocol