Email Alerts
-
Wireless network security testing: Step 3: Demonstrating threats
The abundance of wireless devices is making wireless networks -- both authorized and unauthorized -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Step-by-Step Guide
-
Wireless network security testing: Step 2: Searching for Weaknesses
The abundance of wireless devices is making wireless networks -- both authorized and unauthorized -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Security testing expert Kevin Beaver covers the t... Step-by-Step Guide
-
Wireless network security testing
The abundance of wireless devices is making wireless networks -- both authorized and unauthorized -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Security testing expert Kevin Beaver covers the t... Step-by-Step Guide
-
Hacking Wireless Networks For Dummies, Chapter 10: Still at War
Chapter 10 from Hacking Wireless Networks For Dummies by Kevin Beaver and Peter Davis covers installing and using network discovery and wardriving tools Kismet and Wellenreiter and discusses wardriving countermeasures. Chapter Download
-
Wi-Fi firewalls boost wireless security by blocking airborne attacks
Wi-Fi firewalls, or wireless intrusion prevention systems, are servers that monitor and filter Wi-Fi traffic, blocking unauthorized 802.11 usage and attacks while still in the air. Learn about the benefits of the product and what to consider when sel... Security Spotlight
-
Next steps in municipal wireless mesh networks
Strix Systems VP Nan Chen shares his take on the wireless mesh networking market and why he believes that wireless mesh networks are gaining so much momentum. TechColumn
-
Lesson 4 quiz: I'll be watching you
Find out how much you learned in Lesson 4 of Wireless Security Lunchtime Learning. School
-
Lesson 2 quiz: From the ground up
Find out how much you learned in Lesson 2 of Wireless Security Lunchtime Learning. School
-
Lesson 2: How to build a secure wireless infrastructure
In Lesson 2 of Wireless Security Lunchtime Learning, you'll learn how to build a secure wireless infrastructure by understanding the myriad security standards and features that Wi-Fi products boast, as well as how traditional wired network devices an... School
-
Lesson 3: How to implement secure access
In Lesson 3 of Wireless Security Lunchtime Learning, you'll learn the pros and cons of the various wireless access protocols so you can choose the best method to control, authenticate and authorize access to your WLAN. School
Network Management Strategies for the CIO