Home > Computing and Information Technology > Computer networking and communications > Network management > Cisco Wireless LAN Security: (Networking Technology)
Cisco Wireless LAN Security: (Networking Technology)

Cisco Wireless LAN Security: (Networking Technology)

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

Expert guidance for securing your 802.11 networks Learn best practices for securely managing, operating, and scaling WLANs Comprehend the security-related technological underpinnings of WLANs Explore new security protocols in 802.11i and WPA and learn how they prevent attacks Review centralized deployment models for wired/wireless integration Deepen your knowledge of defense by understanding the tools that attackers use to perform reconnaissance and to attack authentication and encryption mechanisms Understand how to design secure WLANs to support enterprise applications with the new standards and practices detailed in this book Reference the next generation authentication standards and protocols Find out about mobility, hotspots, and campus wireless networks Grasp Open Authentication, MAC-based authentication, shared key authentication, EAP authentication protocols, WEP, WPA, and 802.11i Cisco Wireless LAN Security is an in-depth guide to wireless LAN technology and security, introducing the key aspects of 802.11 security by illustrating major wireless LAN (WLAN) standards that can protect the entire network. Because a WLAN is less effective as an isolated piece of the network, this book emphasizes how to effectively integrate WLAN devices into the wired network while maintaining maximum security. Cisco Wireless LAN Security covers the spectrum of WLAN security, including protocols and specifications, vulnerabilities and threats, and, especially, deployment patterns and design guidelines. With a unique combination of theory and practice, this book addresses fundamental wireless concepts, such as WEP, and innovations, such as EAP, switching, and management. Each chapter includes detailed illustrations, checklists, design templates, and other resources. You will also find generic wireless deployment patterns based on real-world customer installations and functional examples of architecture, design, and best practices. Whether you currently design, configure, implement, and maintain WLANs or simply want to explore wireless security issues, Cisco Wireless LAN Security has everything you need to understand how to create a seamlessly secure, impenetrable 802.11 network. This book is part of the Networking Technology Series from Cisco Press¿ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Table of Contents:
1. Securing WLANs Overview.     WLAN: A Perspective.     Wireless LAN Components and Terminology.     WLAN Standards.     WLAN Security.     WLAN Security Domain Conceptual Model.     Navigating This Book and Contexts.     Summary. 2. Basic Security Mechanics and Mechanisms.     Security Mechanics.     Confidentiality Mechanisms.     Encryption Algorithm Strengths and Weaknesses.     Integrity Mechanisms.     Key Management.     Authentication and Identity Protocols.     PPP Authentication Protocols.     The TACACS+ Protocol.     The RADIUS Protocol.     The Kerberos Protocol.     IPv6.     IPSec.     Summary. 3. WLAN Standards.     Standards Organizations, Position, Context, and Influence.     IEEE.     Wi-Fi Alliance.     Wireless LAN Association.     Hardware/Radio/Waves and Modulation.     FCC Regulations.     Radio Technologies in 802.11.     Brief Discussion on Relevant Standards.     IEEE 802.11.     IEEE 802.11b.     Channel Allocation.     IEEE 802.11a.     IEEE 802.11g.     IEEE 802.11f.     IEEE 802.11e.     IEEE 802.11k.     IEEE 802.11h.     Light Weight Access Point Protocol.     Summary. 4. WLAN Fundamentals.     WLAN: Elements and Characteristics.     WLAN Basic Topology.     WLAN Building Blocks.     Services.     Frames.     WLAN State Diagram.     Basic Choreography.     Beacon.     Probe.     Authentication.     Deauthentication.     Association.     Reassociation.     Disassociation.     Data.     Reason and Status Codes.     WEP.     Summary. 5. WLAN Basic Authentication and Privacy Methods.     Authentication Mechanics.     Open Authentication.     Trust Model and Assumptions.     Supporting AAA Infrastructure.     Applications, Vulnerabilities, and Countermeasures.     Auditing and Accounting.     MAC-Based Authentication.     Trust Model and Assumptions.     Supporting AAA Infrastructure.     Auditing and Accounting.     Applications, Vulnerabilities, and Countermeasures.     Shared-Key Authentication.     Protocol Choreography.     Trust Model and Assumptions.     Supporting AAA Infrastructure.     Auditing and Accounting.     Applications, Vulnerabilities, and Countermeasures.     WEP Privacy Mechanics.     WEP Processing Model.     Vulnerabilities.     Summary. 6. Wireless Vulnerabilities.     Attacker Objectives.     Attack Trees.     Reconnaissance Attacks.     Sniffing and SSIDs.     Sniffing Tools.     Wardriving and Its Tools.     DoS Attacks.     Disassociation and Deauthentication Attacks.     Transmit Duration Attack.     Authentication Attacks.     Shared-Key Authentication Attacks.     MAC Address Spoofing.     WEP Keystream and Plaintext Recovery.     Keystream Dictionaries.     Methods for Recovering RC4 Keystreams.     Uses for Recovered Keystreams.     WEP Key Recovery Attacks.     Dictionary-Based Key Attacks.     The Fluhrer-Mantin-Shamir Attack.     Attacks on EAP Protocols.     Summary of 802.1x and EAP.     Dictionary Attack on LEAP.     PEAP Man-in-the-Middle Attack.     Rogue Aps.     Ad-Hoc Mode Security.     Summary. 7. EAP Authentication Protocols for WLANs.     Access Control and Authentication Mechanisms.     The Three-Party Model.     Layered Framework for Authentication.     EAP.     EAP Frames, Messages, and Choreography.     EAP Authentication Mechanisms.     PEAP.     PEAP Frame Format.     PEAP Arbitrary Parameter Exchange.     PEAP Choreography.     802.1x: Introduction and General Principles.     EAPOL.     Cisco LEAP (EAP-Cisco Wireless).     EAP-FAST.     EAP-FAST Frame Format.     EAP-FAST Choreography.     Summary. 8. WLAN Encryption and Data Integrity Protocols.     IEEE 802.11i.     Encryption Protocols.     WEP.     TKIP (802.11i/WPA).     CCMP.     CCMP Encapsulation.     CCMP Decapsulation.     CCM Algorithm.     Key Management.     Master Key Establishment.     Key Hierarchy.     Key Exchange.     Security Associations.     WPA and Cisco Protocols.     Cisco Protocols.     WPA.     Security Problems Addressed.     Reconnaissance.     DoS Attacks.     Shared-Key Authentication Attacks.     MAC Address Spoofing.     Message Modification and Replay.     Dictionary-Based WEP Key Recovery.     WEP Keystream Recovery.     Fluhrer-Mantin-Shamir Weak Key Attack.     Rogue Aps.     Security Considerations of EAP.     Summary. 9. SWAN: End-to-End Security Deployment.     Overview of SWAN Security Features.     WLAN Deployment Modes and Security Features.     SWAN Infrastructure Authentication.     Radio Management and Wireless Intrusion Detection.     SWAN Fast Secure Roaming (CCKM).     Local 802.1x RADIUS Authentication Service.     Summary. 10. Design Guidelines for Secure WLAN.     WLAN Design Fundamentals.     WLAN Security Policy.     Device Support.     Authentication Support.     Network Services Placement.     Mobility.     Application Support.     Management of the Aps.     Radio Coverage Design.     Multigroup Access.     General Security Recommendations.     AP Recommendations.     WLAN Client Recommendations.     Infrastructure Recommendations.     New WLAN Deployments.     Embedded Security Solutions.     VPN Overlays.     Combined VPN and Embedded Security Design.     Integration with Existing WLAN Deployments.     WPA Upgradeable, WEP Only, and Pre-WEP Devices.     Integrated Deployments.     SWAN Central Switch Design Considerations.     Admission Control Design.     Summary. 11. Operational and Design Considerations for Secure WLANs.     Rogue AP Detection and Prevention.     SWAN Rogue AP Detection.     Manual Rogue AP Detection.     Network-Based Rogue AP Detection.     WLAN Services Scaling.     RADIUS Best Practices.     VPN Best Practices.     Enterprise Guest Access.     Enterprise Guest Access Requirements.     Enterprise Guest Access Design.     Summary. 12. WLAN Security Configuration Guidelines and Examples.     Cisco Enterprise Class Wireless LAN Products.     Cisco Aironet AP1200 Access Point.     Cisco Aironet AP1100 Access Point.     Cisco Aironet AP350 Access Point.     Cisco Aironet BR350 Bridge.     Cisco Aironet BR1410 Bridge.     Cisco Aironet 802.11b/a/g and Cisco Client Extensions-Enabled Devices.     Cisco Secure Access Server.     Cisco Wireless LAN Solution Engine.     Catalyst 6500 Wireless LAN Services Module.     WLAN Security Methods: Configuration Guidelines and Examples.     Navigating the HTML GUI Configuration Pages.     IOS CLI Configuration Examples and Guidelines.     SWAN Nonswitching Deployment: Configuration Guidelines and Examples.     Basic WDS Configuration.     Fast Secure Roaming (CCKM) Configuration.     RF Aggregation Configuration and Rogue AP Detection.     Local Authentication Configuration (RADIUS Fall-Back Service).     Securing Bridge-to-Bridge Links.     Secure WLAN Management Configuration Guidelines.     SWAN Central Switching Deployment: Configuration Guidelines and Examples.     Summary. 13. WLAN Deployment Examples.     Large Enterprise Deployment Examples.     Large Enterprise WLAN Deployment Example I.     Large Enterprise WLAN Deployment Example II.     Vertical Deployment Examples.     Retail WLAN Deployment Example I.     Retail WLAN Deployment Example II.     University WLAN Deployment Example.     Financial WLAN Deployment Example I.     Financial WLAN Deployment Example II.     Healthcare WLAN Deployment Example I.     Healthcare WLAN Deployment Example II.     Manufacturing WLAN Deployment Example.     Small and Medium Businesses and SOHO WLAN Deployments.     Medium Enterprise WLAN Deployment Scenario Example.     Small Office WLAN Deployment Example.     SOHO WLAN Deployment Scenario Example.     Hotspot (Public WLAN) Deployment Examples.     Coffee Shop WLAN Hotspot Deployment Example.     Airport WLAN Deployment Example.     Summary. Appendix A. Resources and References.


Best Sellers


Product Details
  • ISBN-13: 9780133855586
  • Binding: Digital download
  • Series Title: Networking Technology
  • ISBN-10: 0133855589
  • Language: English
  • Weight: 1 gr


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Cisco Wireless LAN Security: (Networking Technology)
-
Cisco Wireless LAN Security: (Networking Technology)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cisco Wireless LAN Security: (Networking Technology)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA