Item description for Hack Proofing Your Wireless Network by Neal O'Farrell...
The only way to stop a hacker is to think like one! Wireless technology is a new and rapidly growing field of concentration for network engineers and administrators. Innovative technology is now making the communication between computers a cordless affair. Wireless devices and networks are vulnerable to additional security risks because of their presence in the mobile environment. Hack Proofing Your Wireless Network is the only book written specifically for architects, engineers, and administrators responsible for securing their wireless networks. From making sense of the various acronyms (WAP, WEP, SSL, PKE, PKI, SSL, SSH, IPSEC) to the implementation of security policies, plans, and recovery protocols, this book will help users secure their wireless network before its security is compromised. The only way to stop a hacker is to think like one...this book details the multiple ways a hacker can attack a wireless network - and then provides users with the knowledge they need to prevent said attacks.
Uses forensic-based analysis to give the reader an insight into the mind of a hacker With the growth of wireless networks architects, engineers and administrators will need this book Up to the minute Web based support at firstname.lastname@example.org
Outline Review With the arrival of IEEE 802.11b (a.k.a. WiFi) and other wireless networking technologies on the market comes a wave of stories about snoops intercepting sensitive LAN traffic from out in the company parking lot or across the concourse at the airport. Hack Proofing Your Wireless Network takes a look at strategies for defending wireless LANs--those based on Bluetooth and IEEE 802.11a as well as WiFi--against signal interception and other attacks peculiar to their wireless nature. Unfortunately, there's also a lot of background information on WiFi (as well as on security principles in general), and this is related to wireless network security only tangentially. Though this material represents unneeded padding, the bulk of the book is made up of useful information about security strategies and defensive configuration. There's also a fair bit of information about the security characteristics of some top-selling wireless networking products.
In a section on choosing WiFi access points, the authors give a very explicit list of requirements (the ability to disable service-set identifier broadcasts, 128-bit Wired Equivalent Protocol--WEP--and so on), and list at least three real products (by make and model) that fit the specifications. They then proceed to show how to choose the most secure configuration options on each of the featured products, including the Cisco Systems Aironet and the Agere ORiNOCO. Configuration instructions are easy to follow and illustrated in detail. Information on the offensive side of the equation is shallower--the authors point out that it's possible to drive around, looking for unsecured wireless access points and that WEP has security flaws. Still, this book is one of the first on security for wireless networks, and it provides a lot of good information to the administrators of such networks. --David Wall
Topics covered: The special security characteristics of wireless networks (primarily including, but not limited to, those operating under the IEEE 802.11 standards) and some recommended procedures for the administrators of such networks. Wired Equivalent Protocol (WEP), MAC filtering, and virtual private networks (VPNs) tailored for use in wireless environments get particularly admirable coverage.
Promise Angels is dedicated to bringing you great books at great prices. Whether you read for entertainment, to learn, or for literacy - you will find what you want at promiseangels.com!
Est. Packaging Dimensions: Length: 9.13" Width: 7.4" Height: 1.26" Weight: 2.34 lbs.
Release Date Feb 28, 2002
ISBN 1928994598 ISBN13 9781928994596
Availability 132 units. Availability accurate as of Jan 17, 2017 01:25.
Usually ships within one to two business days from La Vergne, TN.
Orders shipping to an address other than a confirmed Credit Card / Paypal Billing address may incur and additional processing delay.
Reviews - What do customers think about Hack Proofing Your Wireless Network?
Beam Your Data Through The Air Securely Feb 10, 2005
Hack Proofing Your Wireless Network is an invaluable resource for implementing or administering a wireless network. War Driving (searching for random insecure wireless networks) is happening all over. To keep your personal and confidential information private and to keep prying eyes from surfing your wireless network or hujacking your bandwidth you need to make sure you do everything you can to secure your wireless network. The case studies, Security Alerts, FAQ's and other features of this book all help to provide a comprehensive, must-read book on wireless network security. If you are new to the concept this book is written in a way that you will understand. Even if you know this stuff, this book should be kept close as a reference.
Another good work from Syngress! Jun 20, 2003
Obviously, with WLANs the big issue now is security. If you are looking for a good introduction to the topic or work with WLANs already and need to learn about security, then this is a good place to start. This book lays a good foundation of knowledge and then is an interesting an easy read on the topic. The authors certainly demonstrate that they know their business. In a total of nine chapters they will take you through the majority of what you would need to know to keep your WLAN safe from the wardrivers. In addition to this, if you are thinking of going for any of the WLAN security certifications, this book will take you a long way down that road as well. Once again, another good publication from Syngress!
Well written, and informative Sep 18, 2002
A good book to keep in reach whether you're looking for a refresher, or to learn new processes, techniques, etc. I've got some experience with wireless (although not a guru), and I learned some new stuff... A good book written by authors with obvious wireless experience.
Good info throughout, but this 1st Ed should be 256 pages Apr 2, 2002
"Hack Proofing Your Wireless Network" (HPYWN) weighs in at 512 pages, but it could easily be half that size. While the book contains good information, its internal redundancy and inclusion of security advice not specific to wireless adds unnecessary pages. I recommend security professionals skim HPYWN for the material they need, and skip the generic network protection advice.
Unlike the attack-minded "Hack Proofing Your Network, 2nd Ed", HPYWN is indeed a defensive-oriented book. It offers strong overviews of widely deployed wireless technologies. These include modern cellular networks and wireless area networks created by 802.11, Bluetooth, and HomeRF. HPYWN offers sound advice on making the best use of available wireless defensive mechanisms, despite acknowledging that Wired Equivalent Privacy (WEP) is "broken." An overview of popular wireless assessment tools like Netstumbler is helpful although not especially thorough...
Of the book's nine chapters, chapters 2 (A Security Primer, 50 pages) and 8 (Auditing, 43 pages) don't add anything original to the current body of published security books. Furthermore, many wireless security topics are discussed repeatedly. For example, I didn't need to read in chapters 1, 4, 5, and 6 that WEP's insecurities stem from weak Initialization Vectors. Other recommendations on changing default configurations, enabling logging, and so on also appear in multiple sections. The editor should have consolidated this information to avoid wasting the reader's time.
Overall, Syngress should be credited for getting into the wireless game with this book. I would have preferred to see protocol decodes, thorough documentation and usage examples for wireless assessment tools, and in-depth VPN deployment guidance. Should the second edition of HPYWN contain this information, it will justify its current page count.
Essential book for wireless security Mar 20, 2002
Our company is in the midst of several large scale wireless deployments, and security is one of our primary concerns. This book does a great job of detailing all of the vulnerabilities and attacks, and presents real solutions for preventing attacks and data or services being compromised. There are some good wireles books out there now, but this is the one to get if you want something really focused on security.