Tài liệu Maximum Wireless Security

Thảo luận trong 'Kế Toán - Kiểm Toán' bắt đầu bởi Thúy Viết Bài, 5/12/13.

  1. Thúy Viết Bài

    Thành viên vàng

    Bài viết:
    198,891
    Được thích:
    167
    Điểm thành tích:
    0
    Xu:
    0Xu
    Copyright
    About the Authors
    About the Technical Editors

    We Want to Hear from You!
    Reader Services

    Introduction
    Part I: Wireless Fundamentals
    Chapter 1. Wireless Hardware

    Access Points
    Linksys WAP11
    NetGear ME102
    Antennas
    Radome-Enclosed Yagi Antenna: HyperLink HG2415Y
    Parabolic Grid Antenna: HyperLink HG2419G
    SigMax Omni-Directional: Signull SMISMCO10
    SigMax Circular Yagi: Signull SMISMCY12
    TechnoLab Log Periodic Yagi
    Wireless NICs
    ORiNOCO PC Card
    Handheld Devices
    Compaq iPAQ
    Summary

    Chapter 2. Wireless Network Protocols
    Inside the 802.11 Standard
    Inside the 802.11g Standard
    802.11a Versus 802.11b
    Understanding HomeRF
    Understanding IrDA
    Understanding Bluetooth
    Summary

    Chapter 3. Wireless Programming
    HTML/XML/XHTML
    WAP/WML/WMLScript
    Openwave SDK
    i-mode
    Java
    .NET
    Summary

    Chapter 4. WEP Security
    WEP Introduction
    RC4 Encryption
    How RC4 Works
    Summary


    Part II: Wireless Threats
    Chapter 5. Cracking WEP
    WEP Review
    Data Analysis
    Technical Example
    IV Collision
    Key Extraction
    Summary

    Chapter 6. Hacking Techniques
    Diverse Hacker Attack Methods
    Sniffing
    Spoofing and Session Hijacking
    Understanding Buffer Overflows
    Unexpected Input
    Denial-of-Service Attacks
    Summary

    Chapter 7. Wireless Attacks
    Surveillance
    War Driving
    Client-to-Client Hacking
    Rogue Access Points
    Jamming (Denial of Service)
    Practical WEP Cracking
    Summary

    Chapter 8. Airborne Viruses
    Airborne Viruses
    Virus Overview
    Virus Prevention
    Hostile Web Pages and Scripting
    Palm OS
    Viruses on Windows CE .NET
    Handset Viruses
    Summary


    Part III: Tools of the Trade
    Chapter 9. Auditing Tools
    Ethereal
    NetStumbler
    Kismet
    AirSnort
    WEPCrack
    Windows XP
    AiroPeek NX
    Summary

    Chapter 10. Pocket PC Hacking
    Important URLs
    Pocket PC Installation
    WLAN Drivers
    MiniStumbler
    CENiffer
    Net Force and vxUtil
    IBM Wireless Security Auditor
    Summary

    Chapter 11. Wireless Hack Walkthrough
    The Test Network
    Defining the Goal
    Investigation and Discovery
    Attack Preparation
    Execution
    Clean Up
    Summary


    Part IV: Wireless Security
    Chapter 12. Securing the WLAN

    Access Point-Based Security Measures
    Third-Party Security Methods
    Funk's Steel-Belted Radius
    WLAN Protection Enhancements
    Summary

    Chapter 13. Virtual Private Networks
    VPN Review
    Tunneling
    IPsec
    L2TP
    Attacks Against VPNs
    Deploying VPNs in WLANs
    Summary

    Chapter 14. Intrusion Detection Systems
    Log File Monitors
    Integrity Monitors
    IDS Theory
    Receiver Operating Characteristic Curves
    Hacking Through IDSs
    The Future of IDSs
    Summary

    Chapter 15. Wireless Public Key Infrastructure
    Public Key Cryptography
    Digital Signatures
    Certificate Authorities
    Wireless PKI Implementation
    Transaction Confirmation
    Integrity of User Identities
    Third-Party Services
    WAP PKI
    Summary


    Part V: Appendixes
    Appendix A. Decimal/Hex/Binary Conversion Table
    Appendix B. WEPCrack Exploit Code Example
    GNU General Public License

    Appendix C. References

    Index
     

    Các file đính kèm:

Đang tải...