Wireless network security -- Chapter 8 of 'Essential Computer Security'

About this chapter: Starting with a brief overview of the wireless protocols and technology, this chapter will cover what's required to secure your own home wireless network to keep unauthorized users out of your network. This chapter will also examine the security precautions you should take to securely use a public wireless network. Topics in this chapter include the basics of wireless networks, wireless network security measures and additional hotspot security measures.

About this book: Do you want your computer to be absolutely, positively, 100% secure against all vulnerabilities and exploits both known now and those yet to be discovered? That is simple--leave your computer in the box it came in. The only way to be 100% secure is never to turn the computer on. Once you turn the computer on, you begin a tight-rope-balancing act between functionality/convenience and security.

Read the rest of Wireless network security in this PDF.


Excerpted from Essential Computer Security by Tony Bradley (ISBN: 1597491144). Copyright 2006, Syngress Publishing, Inc.. All rights reserved.


This was first published in December 2006

Join the conversationComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.