E-Book, Englisch, 202 Seiten
Osterhage Wireless Network Security
2. Auflage 2018
ISBN: 978-1-351-60394-2
Verlag: Taylor & Francis
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Second Edition
E-Book, Englisch, 202 Seiten
ISBN: 978-1-351-60394-2
Verlag: Taylor & Francis
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Wireless communications have become indispensable part of our lives. The book deals with the security of such wireless communication. The technological background of these applications have been presented in detail. Special emphasis has been laid on the IEEE 802.11x-standards that have been developed for this technology. A major part of the book is devoted to security risks, encryption and authentication. Checklists have been provided to help IT administrators and security officers to achieve the maximum possible security in their installations, when using wireless technology.
This is the second edition of the book. The updates include the latest the IEEE 802.11-standard, an updated chapter on PDA, the increased relevance of smart phones and tablets, widespread use of WLAN with increased security risks.
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Preface
Introduction
Network Security
Introduction
Weaknesses in Network Security
Relevant Resources
Objectives of a Security Strategy
Security Aspects concerning the Internet
WLAN
WLAN Basic Principles
IEEE 802.11 Overview
Wireless Fidelity
WMAN
Key Terminology
Architecture and Components
Security Requirements
Recent Developments
Mobile Phones
Context
Basic Principles
Communication Protocols
Services
Mobile Phones and WLAN
Threats and Protection
Special Case Blackberries
VoIP
Security Check
Directive
Checklist
Bluetooth
Introduction
Technical Basics
System Topology
Connecting to the Network
Version
Security Aspects
Risk Potentials
Countermeasures
Checklist
Infra Red
Background
IrDA
Applications
Security Aspects
Checklist
Near Field Communication
Introduction
Technology
Specifications
Security Aspects
Conclusions
Security Policy
Introduction
Scope
Information and Communication Security
Physical Security
Documentation
Wireless Security
Summary
Emergency Management in Communication Networks
Emergency Management Systems
Standards
Requirements for Businesses
BCM Overview
Training and Testing
Contents of an Emergency Concept (Documentation)
Intermediate Conclusions
The Emergency Process
References