|
Expert guidance for securing your 802.11 networks
- Learn best practices for securely managing, operating, and scaling WLANs
- Comprehend the security-related technological underpinnings of WLANs
- Explore new security protocols in 802.11i and WPA and learn how they prevent attacks
- Review centralized deployment models for wired/wireless integration
- Deepen your knowledge of defense by understanding the tools that attackers use to perform reconnaissance and to attack authentication and encryption mechanisms
- Understand how to design secure WLANs to support enterprise applications with the new standards and practices detailed in this book
- Reference the next generation authentication standards and protocols
- Find out about mobility, hotspots, and campus wireless networks
- Grasp Open Authentication, MAC-based authentication, shared key authentication, EAP authentication protocols, WEP, WPA, and 802.11i