Wireless network security -- Chapter 8 of 'Essential Computer Security'

Starting with a brief overview of the wireless protocols and technology, this chapter will cover what's required to secure your own home wireless network to keep unauthorized users out of your network. This chapter will also examine the security precautions you should take to securely use a public wireless network. Topics in this chapter include the basics of wireless networks, wireless network security measures and additional hotspot security measures.

About this chapter: Starting with a brief overview of the wireless protocols and technology, this chapter will cover what's required to secure your own home wireless network to keep unauthorized users out of your network. This chapter will also examine the security precautions you should take to securely use a public wireless network. Topics in this chapter include the basics of wireless networks, wireless network security measures and additional hotspot security measures.

About this book: Do you want your computer to be absolutely, positively, 100% secure against all vulnerabilities and exploits both known now and those yet to be discovered? That is simple--leave your computer in the box it came in. The only way to be 100% secure is never to turn the computer on. Once you turn the computer on, you begin a tight-rope-balancing act between functionality/convenience and security.

Read the rest of Wireless network security in this PDF.


Excerpted from Essential Computer Security by Tony Bradley (ISBN: 1597491144). Copyright 2006, Syngress Publishing, Inc.. All rights reserved.

This was last published in December 2006

Dig Deeper on WLAN Standards

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close