Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and explains how to identify and prevent them. Actual cases of attacks against WEP, WPA, and wireless clients and their defenses are included.
This practical resource reveals how intruders exploit vulnerabilities and gain access to wireless networks. You'll learn how to securely deploy WPA2 wireless networks, including WPA2-Enterprise using digital certificates for authentication. The book provides techniques for dealing with wireless guest access and rogue access points. Next-generation wireless networking technologies, such as lightweight access points and cloud-based wireless solutions, are also discussed. Templates, checklists, and examples give you the hands-on help you need to get started right away.
Wireless Network Security: A Beginner's Guide features:
This is an excellent introduction to wireless security and their security implications. The technologies and tools are clearly presented with copious illustrations and the level of presentation will accommodate the wireless security neophyte while not boring a mid-level expert to tears. If the reader invests the time and resources in building a lab to follow along with the text, s/he will develop a solid, basic understanding of what "wireless security" is and how it can be implemented in practice. This is definitely a recommended read for its intended audience. - Richard Austin, IEEE CIPHER, IEEE Computer Society's TC on Security and Privacy (E109, July 23, 2012)
Part II: Developing a Strategy for a Wireless Network
Chapter 4: Building a Budget and Strategy for Wireless Capabilities
Chapter 5: Wireless Strategies for Existing Environments
Chapter 6: Wireless Strategies for New Environment
Part III: Implementing a Wireless Network
Chapter 7: Tracking and Maintaining Budgets
Chapter 8: Implementing Wireless Access into Existing Environments
Chapter 9: Implementing Wireless Access into New Environments
Part IV: Securing and Maintaining Wireless Networks
Chapter 10: Detecting Intrusions on Wireless Networks
Chapter 11: Ensuring Secure Wireless/Wired Connections
Chapter 12: Updating Wireless Access Point Configurations