Email Alerts
-
Best practices for securing your wireless LAN
Perhaps the biggest network security concern for many enterprises is securing a wireless local area network (WLAN). This three-part expert lesson provides best practices for securing a WLAN in the enterprise. Lesson 1 focuses on methods of systematic... Expert Lesson
-
Securing Wireless Systems -- 'Build Your Own Security Lab: A Field Guide for Network Testing,' Chapt
In order to secure your wireless network you must learn some wireless basics and know how to attack your system. In Securing Wireless Systems, Chapter 9 of 'Build Your Own Security Lab: A Field Guide for Network Testing,' author Michael Gregg discuss... Chapter Download
-
Wireless LANs -- 'CCNA Official Exam Certification Library, Third Edition,' Chapter 11
This chapter examines the basics of WLANs to help you prepare for the CCNA exam. In particular, the first section introduces the concepts, protocols, and standards used by many of the most common WLAN installations today. The chapter then examines so... Chapter Download
-
Challenges of managing wireless security covered at Interop
When wireless LANs (WLANs) are deployed as mainstream enterprise network infrastructure, security and management become paramount concerns to corporations. Wireless networking expert Lisa Phifer will speak to these issues of wireless security and man... Interop Las Vegas 2008 ex
-
Wireless network security made easy - from The Book of PF
This chapter from The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall covers the basics of getting a wireless network up and running and some of the options for making your wireless network more secure. It discusses the various encryption met... Chapter Download
-
Wireless security
Wireless security and polices are covered in this guide. Learning Guide
-
Wireless network security best practices
Don't let your wireless LAN (WLAN) jeopardize your corporate networks, servers and data. In this guide, you'll discover how to mitigate the risks WLAN pose and learn how to perform vulnerability assessments to manage potential risks. Best Practices Guide
-
Wireless network security -- Chapter 8 of 'Essential Computer Security'
Starting with a brief overview of the wireless protocols and technology, this chapter will cover what's required to secure your own home wireless network to keep unauthorized users out of your network. This chapter will also examine the security prec... Chapter Download
-
Access on the road: Putting hotspot security to the test
Lisa Phifer and Craig Mathias outline a number of steps that your traveling employees can take to protect themselves while working in public-access networks. Research Report
-
Wireless network security testing: Step 1: Building the right tools
The abundance of wireless devices is making wireless networks -- both authorized and unauthorized -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Security testing expert Kevin Beaver covers the t... Step-by-Step Guide
Network Management Strategies for the CIO