Chapter Download

Wireless network security -- Chapter 8 of 'Essential Computer Security'

About this chapter: Starting with a brief overview of the wireless protocols and technology, this chapter will cover what's required to secure your own home wireless network to keep unauthorized users out of your network. This chapter will also examine the security precautions you should take to securely use a public wireless network. Topics in this chapter include the basics of wireless networks, wireless network security measures and additional hotspot security measures.

About this book: Do you want your computer to be absolutely, positively, 100% secure against all vulnerabilities and exploits both known now and those yet to be discovered? That is simple--leave your computer in the box it came in. The only way to be 100% secure is never to turn the computer on. Once you turn the computer on, you begin a tight-rope-balancing act between functionality/convenience and security.

Read the rest of Wireless network security in this PDF.

Excerpted from Essential Computer Security by Tony Bradley (ISBN: 1597491144). Copyright 2006, Syngress Publishing, Inc.. All rights reserved.

This was first published in December 2006

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: