O'Reilly releases a book on 802.11 security
by Mirko Zorz - Friday, 20 December 2002.
802.11 Security by authors Bruce Potter and Bob Fleck gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you'll want this book beside you every step of the way.

The book covers the entire process of building secure 802.11-based wireless networks, in particular, the 802.11b specification. The authors provide detailed coverage of security issues unique to wireless networking, such as WAP, bandwidth stealing, and the problematic Wired Equivalent Privacy component of 802.11. You'll learn how to configure a wireless client and to set up a WAP using either Linux or Free BSD. You'll also find thorough information on controlling network access and encrypting client traffic.

Beginning with an introduction to 802.11b in general, the book gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. Next, the book details the technical setup instructions needed for both the Linux and FreeBSD operating systems.

Some of the topics covered include:
  • Station Security for Linux, FreeBSD, Open BSD, Mac OS X and Windows
  • Setting Up Access Point Security
  • Gateway Security, including building Gateways, firewall Rules, Auditing, etc.
  • Authentication and Encryption
  • FreeBSD IPsec client and gateway configuration
  • Linux IPsec client and gateway configuration
  • 802.1x authentication
There's a chapter in PDF format available for reading, Chapter 7: Mac OS X Station Security.

Spotlight

Intentional backdoors in iOS devices uncovered

Posted on 22 July 2014.  |  A researcher has revealed that Apple has equipped its mobile iOS with several undocumented features that can be used by attackers and law enforcement to access the sensitive data contained on the devices running it.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Jul 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //