"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."
--Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program
Wireless networks are so convenient - not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor.
Discover how to:
Peter T. Davis, CISSP, has worked with information systems audits and security for 24 years.
This complete resource for CIOs and IT managers provides effective strategies to address the human element that is so fundamental to success and explains how to maximize the voice of your customers while keeping in touch with the needs of your staff. And perhaps most importantly—it provides the evidence needed to build your case to upper management.
Supplying you with the tools to create methods that will bring out the best in your employees; Lean Six Sigma Secrets for the CIO provides the understanding required to manage your IT operations with unique effectiveness and efficiency in service of the bottom line.
Wireless Networks For Dummies was coauthored by Barry D. Lewis, CISSP, and Peter T. Davis, who also coauthored Computer Security For Dummies. Barry Lewis is president of an information security consulting firm and an internationally known leader of security seminars. Peter Davis is founder of a firm specializing in the security, audit, and control of information. Together, they cut through the cables, clutter, and confusion and help you:Get off to a quick start and get mobile with IrDA (Infrared Data Association) and Bluetooth Perform a site survey and select the right standard, mode, access point, channel and antenna Check online to verify degree of interoperability of devices from various vendors Install clients and set up roaming Combat security threats such as war driving, jamming, hijacking, and man-in-the-middle attacks Implement security and controls such as MAC (Media Access Control) and protocol filtering, WEP (Wireless Equivalent Privacy), WPA, (Wi-Fi Protected Access), EAP (Extensible Authentication Protocol), and VPN (Virtual Private Network) Set up multiple access points to form a larger wireless network
Complete with suggestions of places to get connected, Web sites where you can get more information, tools you can use to monitor and improve security, and more, Wireless Networks For Dummies helps you pull the plug and go wireless!