Browse DevX
Sign up for e-mail newsletters from DevX


Book Excerpt: Real 802.11 Security: Wi-Fi Protected Access and 802.11i

''Real 802.11 Security: Wi-Fi Protected Access and 802.11i'' focuses on why the latest Wi-Fi LAN security methods are secure and shows you how they work. Read Chapter 3, ''Why Is Wi-Fi Vulnerable to Attack''




Building the Right Environment to Support AI, Machine Learning and Deep Learning

nlike other Wi-Fi security books, which primarily focus on parameter setting or configuring a computer, this book describes new approaches to wireless security enabled by the recent development of new core technologies for Wi-Fi/802.11. These new developments achieve what no amount of re-configuration can do: they solve the problem at the source. This book focuses on how the new approaches work and how they should be applied to achieve maximum effect. It also brings to light current weaknesses and offers practical, implementable solutions.

In the first section, "Wireless LAN Security Principals," we look at the issues that everybody should know about security. Some of these issues are common sense but many are things that you may not have thought about. If you are already security expert, and just looking to find out how security works for Wi-Fi, you might skim this section as many of the principals will be familiar.

Chapter 3 discusses changing the security model, what the enemies are like, traditional security architecture, and the danger of passive monitoring.

Download the PDF of Chapter 3: "Why Is Wi-Fi Vulnerable to Attack?"

Reproduced from Real 802.11 Security: Wi-Fi Protected Access and 802.11i by permission of Addison-Wesley. ISBN 0321136209, copyright 2003. All rights reserved.

Comment and Contribute






(Maximum characters: 1200). You have 1200 characters left.



Thanks for your registration, follow us on our social networks to keep up-to-date