{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

wi - Table of Contents Copyright 1 Praise for Real 802.11...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Table of Contents Copyright. ................................................................................................................................................ 1 Praise for Real 802.11 Security: Wi-Fi Protected Access and 802.11i. .................................................. 1 Preface. ..................................................................................................................................................... 1 Why This Book Now?. ..................................................................................................................... 2 Audience. .......................................................................................................................................... 3 Organization. .................................................................................................................................... 4 Disclaimer. ....................................................................................................................................... 4 Acknowledgments. ................................................................................................................................... 4 Part I: What Everyone Should Know. ............................................................................................................ 11 Chapter 1. Introduction. ......................................................................................................................... 12 Setting the Scene. ........................................................................................................................... 12 Roadmap to the Book. .................................................................................................................... 13 Notes on the Book. ......................................................................................................................... 13 Chapter 2. Security Principles. ............................................................................................................... 17 What Is Security?. .......................................................................................................................... 20 Good Security Thinking. ................................................................................................................ 20 Security Terms. .............................................................................................................................. 21 Summary. ....................................................................................................................................... 21 Chapter 3. Why Is Wi-Fi Vulnerable to Attack?. .................................................................................. 22 Changing the Security Model. ........................................................................................................ 26 What Are the Enemies Like?. ......................................................................................................... ....
View Full Document

{[ snackBarMessage ]}

Page1 / 318

wi - Table of Contents Copyright 1 Praise for Real 802.11...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon bookmark
Ask a homework question - tutors are online