Browse DevX
Sign up for e-mail newsletters from DevX


Book Excerpt: 802.11 Security

This book provides practical examples and step-by-step instructions for deploying secure 802.11b-based systems. Primarily, the discussions in ''802.11 Security'' revolve around Linux and FreeBSD, but there is also a great deal of general-purpose information—as well as tips and techniques for Windows users and users of firmware-based wireless access points.




Building the Right Environment to Support AI, Machine Learning and Deep Learning

he integrity and confidentiality of information traveling through the air has always been a concern. Who is really broadcasting the signal you are receiving? Is anyone eavesdropping on the signal? These questions become critical when you are transmitting data between military installations or making a stock transaction over the Internet using your 802.11b-capable PDA. Due to the ease with which an attacker can intercept or modify your 802.11b communications, it is imperative that you understand the risks in using a wireless network and how to protect yourself, your infrastructure, and your users.

Chapter 1 discusses the basics of wireless, radio transmission, inherent security concerns, 802.11, WEP, problems associated with WEP, and more.

Download the PDF of Chapter 1: "A Wireless World"

Chapter 2 delves farther into the world of wireless and discusses Denial-of-Service Attacks, Man-in-the-Middle Attacks, illicit use, wireless risks, and more.

Download the PDF of Chapter 2: "Attacks and Risks"

Reproduced from 802.11 Security by permission of O'Reilly & Associates. ISBN 0596002904, copyright 2003. All rights reserved.

Comment and Contribute






(Maximum characters: 1200). You have 1200 characters left.



Thanks for your registration, follow us on our social networks to keep up-to-date