Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
177
result(s) for
"Wireless LANs Security measures."
Sort by:
Hacking exposed. Wireless : wireless security secrets & solutions
Exploit and defend against the latest wireless network attacks. Learn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you'll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and learn how attackers impersonate cellular networks. This book features expert coverage of ever-expanding threats that affect leading-edge technologies, including Bluetooth Low Energy, Software Defined Radio (SDR), ZigBee, and Z-Wave.
Secure roaming in 802.11 networks
by
Goransson, Paul
,
Greenlaw, Raymond
in
IEEE 802.11 (Standard)
,
Wireless LANs
,
Wireless LANs -- Security measures
2007,2011
Secure Roaming in 802.11 Networks offers a comprehensive treatise on Wi-Fi 802.11 roaming by comparing/contrasting it to cellular roaming theory and techniques. The book explores the fundamental concepts, basic theory, and key principles of 802.11 networks with roaming capabilities. It helps ensure secure and constant connectivity of laptops, PDAs and other emerging mobile devices.Today, we increasingly expect to find public Wide Local Area Network (WLAN) 802.11 access in our airports, public spaces, and hotels, and we want to maintain our connections when we’re mobile and using 802.11 WLANs. However, 802.11 was not originally designed with roaming capabilities and can’t, in its \"pure\" form, support seamless roaming between different hotspots and other 802.11 access points. This book details the theory behind various 802.11 extensions to permit roaming and describes how these extensions can be successfully implemented in 802.11 WLANs. It reviews coverage of user authentication in 802.11, as well as roaming between 802.11 and other wireless technologies. It also discusses wireless technologies and application programming interfaces.This book will appeal to RF/wireless engineers and designers, computer/data network engineers, and graduate students.* Offers a comprehensive treatise on Wi-Fi 802.11 roaming by comparing/contrasting it to cellular roaming theory and techniques* Emerges as a \"one stop\" resource for design engineers charged with fulfilling the market need for seamless 802.11 device roaming capabilities* Builds upon the knowledge base of a professional audience without delving into long discussions of theory long since mastered
Optimizing and Testing WLANs
2007,2011
As WLANs (Wireless Local Area Networks) become increasingly common, it's becoming vital to be able to test them for proper performance and to optimize their operation. This book, written by a member of the IEEE committee that develops WLAN standards, is the first book addressing that need. It covers test equipment and methods for the RF (wireless) and physical layers of WLAN, protocols, the application layer, and manufacturing testing. The emphasis throughout is on underlying engineering principles along with modern metrics and methodologies, ensuring this book gives both a solid theoretical background along with field-proven techniques and applications.Much of the subject material is drawn from the author's own hands-on experience in the field, as an architect and engineer of WLAN test equipment, and a writer of standards for measuring WLAN equipment performance. A particularly engaging chapter deals with manufacturing test, describing some of the different manufacturing test setups and equipment. A concise introduction to deployment testing of \"hotspots\" and WLANs in enterprises is also provided. *Gives proven techniques for maximizing the coverage area and performance of wireless networks *Author's insider position on the IEEE committee developing standards for WLAN testing ensures timeliness and technical integrity of the material *Includes coverage of newer multiple input/multiple output (MIMO) wireless networks
How to Cheat at Securing a Wireless Network
by
Barken, Lee
,
Hurley, Chris
in
Security measures
,
Wireless communication systems
,
Wireless LANs
2006
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless networkWith the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the network’s vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users.· A practical product and technology specific guideline to securing a wireless networks for the busy System Administrator· Takes a simplified multi-layered approach into easily deployed plans for a straight forward understanding· Does not bog you down with history, but offers practical useful information for today
Security in wireless LANs and MANs
by
Hardjono, Thomas
,
Dondeti, Lakshminath R.
in
Metropolitan area networks (Computer networks)
,
Metropolitan area networks (Computer networks) -- Security measures
,
Security measures
2005,2004
With the popularity of the Wireless Local Area Network (WLAN) standard 802.11 WiFi® and the growing interest in the next generation Wireless Metropolitan Area Network (WMAN) standard 802.16 WiMax®, the need for effective solutions to the inherent security weaknesses of these networking technologies has become of critical importance. Thoroughly explaining the risks associated with deploying WLAN and WMAN networks, this groundbreaking book offers you practical insight into identifying and overcoming these security issues.
Bulletproof wireless security : GSM, UMTS, 802.11 and Ad Hoc security
by
Chandra, Praphul
in
Global system for mobile communications
,
Global system for mobile communications -- Security measures
,
IEEE 802.11 (Standard)
2005,2011
Finally--a single volume guide to really effective security for both voice and data wireless networks!More and more data and voice communications are going via wireless at some point between the sender and intended recipient. As a result, truly \"bulletproof\" wireless security is now more than a desirable feature--instead, it's a necessity to protect essential personal and business data from hackers and eavesdroppers.In this handy reference, Praphul Chandra gives you the conceptual and practical tools every RF, wireless, and network engineer needs for high-security wireless applications.Book Review From EDN Magazine:http://www.edn.com/article/CA632302.html?industryid=2817 Inside this book you'll find coverage of these essential topics:+ Cryptographic protocols used in wireless networks.+ Key-based protocols, including key exchange and authentication techniques+ Various types of wireless network attacks, including reflection, session hijacks, and Fluhrer-Mantin-Shamir (FMS) attacks.+ Encryption/decryption standards and methods.+ Multi-layered security architectures.+ Secure sockets layer (SSL) and transport layer security (TLS) protocols.+ Cellular telephone network architectures and their vulnerabilities.+ Modulation techniques, such as direct-sequence spread spectrum (DSSS) and orthogonal frequency division multiplexing (OFDM).And you'll also find coverage on such cutting-edge topics as security techniques for ad hoc networks and protecting Bluetooth networks. If you're serious about wireless security, then this title belongs on your reference bookshelf!
Secure Roaming in 802. 11 Networks
Ensure secure and constant connectivity of laptops, PDAs and other emerging mobile devices with this reference.
Agriculture and rural society after the Black Death : common themes and regional variations
by
Dodds, Ben
,
Britnell, Richard
in
Agriculture
,
Agriculture -- Europe -- History -- To 1500
,
Agriculture -- Europe -- Regional disparities
2008
This is a new collection of essays on agriculture and rural society in the late Middle Ages, in particular following the Black Death. It combines a broad perspective on agrarian issues such as depopulation and social conflict with illustrative material from detailed local and regional research to show how general problems were worked out in specific contexts. The contributors explore the wide regional variety across Europe (which was influenced by climatic differences and broad spatial variables such as levels of urbanisation and commercial infrastructure), yet they argue that a European history is nevertheless possible. They also supply detailed studies from regional British contexts relating to, amongst other issues, the use of the land, the movement of prices, the distribution of property, the organisation of trade and the cohesion of village society. There is new research on several aspects of regional development in medieval England and other European countries: Robert Swanson, a leading authority on the history of the late medieval Church, discusses how the collection of tithes to maintain local clergy in the medieval Church contributed to the commercialisation of trade in grain and other agricultural products; Peter Larson shows how villagers became increasingly prone to violence in the generations following the Black Death, in response to the social upheavals caused by the epidemic. If there is a single overarching idea that gives the collection coherence, it is that trends in agriculture during the late Middle Ages were more varied than has usually been supposed. Taken as a whole, the book supplies a valuable introduction to problems and research methods together with original contributions to knowledge based on current research.
BackTrack 5 Wireless Penetration Testing - Beginner's Guide
Written in Packt’s Beginner’s Guide format, you can easily grasp the concepts and understand the techniques to perform wireless attacks in your lab. Every new attack is described in the form of a lab exercise with rich illustrations of all the steps associated. You will practically implement various attacks as you go along. If you are an IT security professional or a security consultant who wants to get started with wireless testing with Backtrack, or just plain inquisitive about wireless security and hacking, then this book is for you. The book assumes that you have familiarity with Backtrack and basic wireless concepts.