文档介绍:Security
By Bob Fleck, Bruce Potter
Publisher : O'Reilly
Pub Date : December 2002
ISBN : 0-596-00290-4
Pages : 208
Beginning with an introduction to in general, Security gives
you a broad basis in theory and practice of wireless security, dispelling some
of the myths along the way. In doing so, they provide you with the technical
grounding required to think about how the rest of the book applies to your
specific needs and situations. If you are work, security, or systems
engineer, or anyone interested in deploying --based systems, you'll
want this book beside you every step of the way
Copyright
Preface
Assumptions About the Reader
Scope of the Book
Conventions Used in This Book
Other Sources of Information
We'd Like to Hear from You
Acknowledgments
Part I: Security Basics
Chapter 1. A Wireless World
Section . What Is
Wireless?
Section . Radio
Transmission
Section . Inherent
Insecurity
Section .
Section . Structure
of MAC
Section . WEP
Section . Problems
with WEP
Section . Is It
Hopeless?
Chapter 2. Attacks and Risks
Section . An
work
Section . Denial-
of-Service Attacks
Section . Man-in-
the-Middle Attacks
Section . Illicit Use
Section . Wireless
Risks
Section . Knowing
Is Half the Battle
Part II: Station Security
Chapter 3. Station Security
Section . Client
Security Goals
Section . Audit
Logging
Section . Security
Updates
Chapter 4. FreeBSD Station Security
Section . FreeBSD
Client Setup
Chapter 5. Linux Station Security
Section . Linux
Client Setup
Section . Kernel
Configuration
Section . OS
Protection
Section . Audit
Logging
Section . Secure
Communication
Chapter 6. OpenBS