Электронная книга: Peter Davis T. «Wireless Networks For Dummies»

Wireless Networks For Dummies

You’ve probably heard the expression, “It’s time to cut the cord.” Well, it may be time to “cut the cables” at your office and free yourself from your desk and computer. Wireless networks are the waves of the future—literally. Wireless Networks For Dummies guides you from design through implementation to ongoing protection of your system and your information so you can: Remain connected to the office in airports and hotels Access the Internet and other network resources in the lunchroom, conference room, or anywhere there’s an access point Use your PDA or laptop to query your database from the warehouse or the boardroom Check e-mail wirelessly when you’re on the road Get rid of the cable clutter in your office Wireless Networks For Dummies was coauthored by Barry D. Lewis, CISSP, and Peter T. Davis, who also coauthored Computer Security For Dummies. Barry Lewis is president of an information security consulting firm and an internationally known leader of security seminars. Peter Davis is founder of a firm specializing in the security, audit, and control of information. Together, they cut through the cables, clutter, and confusion and help you: Get off to a quick start and get mobile with IrDA (Infrared Data Association) and Bluetooth Perform a site survey and select the right standard, mode, access point, channel and antenna Check online to verify degree of interoperability of devices from various vendors Install clients and set up roaming Combat security threats such as war driving, jamming, hijacking, and man-in-the-middle attacks Implement security and controls such as MAC (Media Access Control) and protocol filtering, WEP (Wireless Equivalent Privacy), WPA, (Wi-Fi Protected Access), EAP (Extensible Authentication Protocol), and VPN (Virtual Private Network) Set up multiple access points to form a larger wireless network Complete with suggestions of places to get connected, Web sites where you can get more information, tools you can use to monitor and improve security, and more, Wireless Networks For Dummies helps you pull the plug and go wireless!

Издательство: "John Wiley&Sons Limited (USD)"

ISBN: 9780764579776

электронная книга

Купить за 1950.53 руб и скачать на Litres

Другие книги схожей тематики:

АвторКнигаОписаниеГодЦенаТип книги
Silviu AngelescuCCNA Certification All-In-One For DummiesA complete preparation guide for the entry-level networking CCNA certification If you're planning to advance your career by taking the all-important Cisco Certified Network Associate (CCNA), this is… — @John Wiley&Sons Limited (USD), @ @ @ @ Подробнее...
2926.13электронная книга

См. также в других словарях:

  • Cracking of wireless networks — is the penetration of wireless networks. A wireless network can be penetrated in a number of ways. These ways vary greatly in the level of computer skill and commitment they require. Once within a network, a skilled hacker can modify software,… …   Wikipedia

  • Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… …   Wikipedia

  • Wireless hacking — In security breaches, wireless hacking is the unauthorized use or penetration of a wireless network. A wireless network can be penetrated in a number of ways. There are methods ranging from those that demand a high level of technological skill… …   Wikipedia

  • WarXing — WarXing, NetStumbling or WILDing [ [http://www.bawug.org WILDing] ] is the activity of detecting publicly accessible computer systems or (wireless) networks. The X may be replaced by a more specific activity to give the following… …   Wikipedia

  • RF monitor software — is software which (with special hardware as a WiFi card) is able to detect signal strength and bit error rate of wireless networks. RF monitor software includes network discovery software programs as KIsmet and Network stumbler, yet these latter… …   Wikipedia

  • WHOIS — (pronounced who is ; not an acronym) is a query/response protocol which is widely used for querying an official database in order to determine the owner of a domain name, an IP address, or an autonomous system number on the Internet. WHOIS… …   Wikipedia

  • Network encryption cracking — is the breaching of network encryptions (e.g., WEP, WPA, ...), usually through the use of a special encryption cracking software. It may be done through a range of attacks (active and passive) including injecting traffic, decrypting traffic, and… …   Wikipedia

  • Network detector — Network detectors or network discovery software are computer programs that facilitate detection of wireless LANs using the 802.11b, 802.11a and 802.11g WLAN standards.[1] Discovering networks may be done through active as well as passive scanning …   Wikipedia

  • GSM — For other uses, see GSM (disambiguation). The GSM logo is used to identify compatible handsets and equipment GSM (Global System for Mobile Communications, originally Groupe Spécial Mobile), is a standard set developed by the European… …   Wikipedia

  • Computer literacy — For the Silicon Valley retailer, see Computer Literacy Bookstore. Computer literacy is defined as the knowledge and ability to use computers and related technology efficiently, with a range of skills covering levels from elementary use to… …   Wikipedia

  • Home network — Home networking standards Common name IEEE standard HomePlug IEEE 1901 Wi Fi 802.11a 802.11b 802.11g 802.11n Common name ITU T recommendation HomePNA 2.0 G.9951–3 …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»