E-Book Overview
Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b - based systems, you'll want this book beside you every step of the way.
E-Book Content
802.11 Security By Bob Fleck, Bruce Potter Publisher : Pub Date : ISBN : Pages : O'Reilly December 2002 0-596-00290-4 208 Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you'll want this book beside you every step of the way Copyright Preface Assumptions About the Reader Scope of the Book Conventions Used in This Book Other Sources of Information We'd Like to Hear from You Acknowledgments Part I: 802.11 Security Basics Chapter 1. A Wireless World Section 1.1. What Is Wireless? Section 1.2. Radio Transmission Section 1.3. Inherent Insecurity Section 1.4. 802.11 Section 1.5. Structure of 802.11 MAC Section 1.6. WEP Section 1.7. Problems with WEP Section 1.8. Is It Hopeless? Chapter 2. Attacks and Risks Section 2.1. An Example Network Section 2.2. Denialof-Service Attacks Section 2.3. Man-inthe-Middle Attacks Section 2.4. Illicit Use Section 2.5. Wireless Risks Section 2.6. Knowing Is Half the Battle Part II: Station Security Ch