How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN

Overview

Now you can have the awesome benefits of wireless LANswithout falling victim to their notorious security flaws. Leadingwireless security expert Lee Barken shows you practicalworkarounds and fixes for the vulnerabilities in today'sWLANs, introduces high-security wireless protocols new to themarketplace, and offers step-by-step instructions for protectingall your wireless information, from the home to the enterprise.This is the definitive and easy-to-use WLAN security book you'vebeen searching for--whether you're a...

See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (11) from $1.99   
  • New (4) from $28.03   
  • Used (7) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$28.03
Seller since 2008

Feedback rating:

(17428)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
Brand New, Perfect Condition, Please allow 4-14 business days for delivery. 100% Money Back Guarantee, Over 1,000,000 customers served.

Ships from: Westminster, MD

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
$28.04
Seller since 2007

Feedback rating:

(23278)

Condition: New
BRAND NEW

Ships from: Avenel, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
$40.00
Seller since 2010

Feedback rating:

(7)

Condition: New
8-26-03 other 1 BRAND NEW! ONLY Expedited orders are shipped with tracking number! *WE DO NOT SHIP TO PO BOX* Please allow up to 14 days delivery for order with standard ... shipping. SHIPPED FROM MULTIPLE LOCATIONS. Read more Show Less

Ships from: San Jose, CA

Usually ships in 1-2 business days

  • Canadian
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$44.44
Seller since 2013

Feedback rating:

(2)

Condition: New
New

Ships from: San Diego, CA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

Now you can have the awesome benefits of wireless LANswithout falling victim to their notorious security flaws. Leadingwireless security expert Lee Barken shows you practicalworkarounds and fixes for the vulnerabilities in today'sWLANs, introduces high-security wireless protocols new to themarketplace, and offers step-by-step instructions for protectingall your wireless information, from the home to the enterprise.This is the definitive and easy-to-use WLAN security book you'vebeen searching for--whether you're a network administrator,security specialist, manager, or home user.

Topics covered include--

  • Why conventional wireless LANs are so insecure--and what you can do about it
  • "Wardriving" software, equipment, and techniques: knowing your enemy
  • 802.11i, WPA, TKIP, and AES: the new wireless security options
  • 802.1x and EAP: enabling port-based authentication on your WLAN
  • Safely connecting WLANs to wired networks
  • Securing home and small office environments, one step at a time
  • Accessing VPNs from wireless devices
  • Integrating firewalls and wireless access points
  • Improving security in public access environments
  • Securing enterprise environments with 802.1x--a start-to-finish walkthrough
Read More Show Less

Product Details

  • ISBN-13: 9780131402065
  • Publisher: Prentice Hall
  • Publication date: 8/29/2003
  • Pages: 199
  • Product dimensions: 6.90 (w) x 9.40 (h) x 0.60 (d)

Meet the Author

About the Author

LEE BARKEN, CISSP, CCNA, MCP, CPA, has been in the IT industry since 1987. He has worked as anIT consultant and network security specialist for Ernst and Young's Information Technology RiskManagement (ITRM) practice and KPMG's Risk and Advisory Services (RAS) practice. He co-foundedthe San Diego Wireless Users Group and writes and speaks on the topic of wireless LANtechnology and security. He is the technical editor for Mobile Business Advisor Magazine, andteaches Wireless LAN Security and Deployment classes for the University of California at SanDiego (UCSD) extension.

Read More Show Less

Table of Contents

(NOTE: Each chapter begins with an Introduction and concludes with a Summary.)

Foreword.

Introduction.

1. The Need For Wireless LAN Security.

Security in Layers. Size Matters—What Are You Protecting? Wireless LAN 101. Shared Key Authentication. Wi-Fi Protected Access (WPA). Beware: The Walls are Listening… Stop the RF Bleeding.

2. Introduction to WLAN.

Pre-802.11. 802.11 (1997). Spread Spectrum. 801.11b. Interoperability. Critical Mass. 802.11a. 802.11g. Other Working Groups. 802.11 Specification. A Tale of Two Topologies. CSMA/CA. RTS/CTS. Fragmentation.

3. WEP Vulnerabilities—Wired Equivalent Privacy?

WEP 101. Decrypting the WEP Message. Key Management Problems. RC4 Stream Cipher. IV Collisions. Message Injection. Authentication Spoofing. Brute Force Attacks. Cracking WEP Keys. Now What?

4. War Driving: Tools and Techniques.

What Is War Driving? Wireless Sniffers. Putting It All Together. Ethical Considerations. War Chalking.

5. 802.11I, WPA, TKIP, AND AES.

WPA to the Rescue! TKIP. WPA for the Home. 802.11i and AES.

6. 802.1x Explained.

Where Did 802.1x Come From? Guilty Until Proven Innocent (or Authenticated). 802.1x Authentication Conversation. Solving Security Problems with 802.1x. But Wait, There's More! Competing Standards.

7. Connecting a WLAN to the Wired Network.

Assessing the Information Assets. A Layered Approach. Multiple SSIDs. 802.1x vs. VPN. Hands-on Projects.

8. How to Deploy a VPN for Wireless Environments.

PPTP vs. L2TP/IPSec. PPTP: Point-to-Point Tunneling Protocol. L2TP: Layer 2 Tunneling Protocol with IPSec. Choosing an Authentication Protocol. Building a VPN Server. Configuring the VPN Server. Configuring Clients. The Downside to VPNs.

9. How to Secure and Manage a Home Environment.

Basic Security Steps. Beyond Security: Managing the Network. AP on Steroids? Linux Embedded Appliance Firewall (LEAF). Adding Wireless Client Support to Bering. Sputnik around the World. ReefEdge Dolphin.

10. How to Secure an Enterprise Environment.

802.1x Revisited. Setting Up the Authentication Server. Configuring the CA. Configuring the Authenticator. Using EAP-TLS with Windows 2000 Server.

11. Setting Up a Secure Public Hotspot: Building A Linux-Based Access Point.

HostAP Prism Driver for Linux. NoCat. The 800-Pound Pebble. LEAF to the Rescue. Troubleshooting Tips.

Appendix A: Introduction to RF.

The History of Radio Frequency. Electromagnetism. Induction. Conduction. Radio Waves. Structure of a Wave. Modulation. Attenuation. Antennae. How Antennae Work. Different Kinds of Antennae. Antenna Types. Summary.

Appendix B: 802.11 Frame Types.

Management Frames. Control Frames. Data Frames.

Appendix C: Community Wireless Networking.

For Pay. Amenity. Utility. User Groups. The Mission. The Legal Issues. Sentre Partners in San Diego. Software Options for Free Hotspots. The Big Picture.

Appendix D: Building a Pringles Can Antenna.

Index.

Read More Show Less

Preface

Introduction

How Secure is Your Wireless Network? is a book about taking the next step and securing yourwireless network. Announcements by major companies backing wireless technologies are settingthe stage for wide-scale deployments and the ushering in a new era of wireless freedom.Companies like Intel have announced the Centrino chipset that will integrate 802.11functionality into their products. Dell, Gateway, IBM and others have announced initiatives tointegrate wireless technology into their laptops. T-Mobile, Boingo, Wayport and dozens ofothers have deployed hotspots in Starbucks, Borders, and Kinkos locations as well as hotels,airports and other public venues across the world. Almost every University has deployed somekind of wireless initiatives, with high schools and elementary schools following in theirfootsteps. Millions of home users have discovered the joys of wireless networking. Nowbusinesses everywhere are getting on board as well.

The bottom line is that wireless is here to stay. The integration of 802.11 into almost allnew laptops and handheld devices, coupled with the explosion in availability of public hotspotshas created a virtuous cycle of large-scale wireless proliferation. This invisible, yetinescapable flood of radio waves has landed squarely in our homes and businesses where itpresents a whole new security challenge. How do we embrace the joys of wireless networks whilewe maintain an essential balance with the security needs of our organization?

This book is all about understanding the technology, recognizing the security risks andimplementing a responsible and realistic game plan for safe and secure wireless communication.

Why I Wrote This Book

Although I had seen many demonstrations of wireless networks, it wasn't until the summer of2001, that I found my true inspiration. At a large security conference, after listening tospeakers talk about community wireless networks, WLAN security and other wireless topics, Icame back home energized and decided it was time to put that spirit to work. A few weeks later,I started the San Diego Wireless Users Group with some friends and found my new passion inwireless technology. With the help of countless dedicated volunteers, including Alan Koebrick,John Eder, Eric Bermel, Michael Mee, and others, we hold monthly meetings with presentations ona variety of topics to share our passion for learning, meet likeminded wireless enthusiasts andhelp one other learn more about this wonderful technology. I've always enjoyed being a "tinkerer," eager to learn how things work.I was the kid who took apart the radio (or telephone, or video game) to check out the parts andunderstand how something operated. Wireless LANs were no different. Fundamentally, if you wantto develop a genuine appreciation for the security risks of wireless networks, you have to rollup your sleeves, get some wireless components together and play.

I wrote this book to go beyond the "WEP is bad" headlines and dig a little deeper tounderstand exactly what was happening under the hood and what to do about it.

Organization

The journey of How Secure is Your Wireless Network? begins with an introduction to wirelesssecurity including a detailed review of the risks and attacks. Next, we move into a tour of thenative 802.11 security solutions. Finally, we explore a variety of hands-on deploymentsolutions.

Here is an overview of each chapter--

Chapter 1 is a review of the general wireless landscape. We begin to ask some of the keyquestions that will lay a foundation for the rest of the book. In particular, we look at howsecurity decisions are affected by factors such as deployment size, mobility needs and othersecurity design requirements. We also review SSID broadcasts, MAC filtering, and Shared KeyAuthentication.

Chapter 2 starts with a stroll down memory lane as we outline some of the history of the802.11 protocol including 802.11 (1997), Direct Sequence Spread Spectrum (DSSS), and FrequencyHopping Spread Spectrum (FHSS). We take a look at 802.11 a, b and g and some of theirperformance characteristics. Next, we dig deeper into the 802.11 protocol with a review ofarchitecture topologies ("Infrastructure" and "Ad-Hoc" modes) as well as CSMA/CA, RTS/CTS andFragmentation.

Chapter 3 is where we jump into a detailed review of WEP and its vulnerabilities. Thisincludes a description and explanation of all known WEP attacks.

Chapter 4 describes "War Driving," including all of the hardware, software, tools and techniques so you can understand how to discover Access Points on your own. We include adiscussion of War Chalking and the ethical considerations of War Driving.

Chapter 5 discusses 802.11i, WPA, TKIP and AES. In this Chapter, we dig a little deeperinto WEP vulnerabilities and ways in which we can mitigate the risk with newer technologies.This includes a description of new encryption methods such as TKIP, AES and other 802.11igoodies.

Chapter 6 follows up on Chapter 5 with a detailed analysis of how 802.1x works, as well asa review of popular EAP types and guidelines to help you choose which one is best for yourparticular situation.

Chapter 7 focuses on transitioning between the "under the hood" theme in the first half ofthe book, into the "hands-on" theme of the second half of the book. In this Chapter we discussthe basic security architecture considerations when connecting the WLAN to the wired networkand moving from theory to application.

Chapter 8 discusses VPNs, a comparison of various technologies and a step-by-stepdescription of how to implement a Microsoft VPN solution.

Chapter 9 talks about securing home environments. It includes a step-by-step guide tobuilding a Linux Embedded Appliance Firewall (LEAF), Sputnik and ReefEdge's Dolphin.

Chapter 10 revisits 802.1x and discusses security in an enterprise environment. Thestep-by-step instructions describe how to deploy 802.1x using Microsoft as a Supplicant andAuthentication Server, with a Cisco AP as the Authenticator.

In Chapter 11 we review 802.11 in a public hotspot environment. For our step-by-stepproject, we describe how to build a Linux based AP using HostAP, NoCat and LEAF.

Appendix A offers an introdcution to RF. Appendix B discusses various 802.11 frame types.Appendix C gives a detailed overview of community wireless networking. And finally, in AppendixD, you'll find detailed instructions, with illustrations, on how to build a working wirelessantenna out of a cylindrical potato-chip can.

Thank you for choosing this book.

Read More Show Less

Introduction

Introduction

How Secure is Your Wireless Network? is a book about taking the next step and securing yourwireless network. Announcements by major companies backing wireless technologies are settingthe stage for wide-scale deployments and the ushering in a new era of wireless freedom.Companies like Intel have announced the Centrino chipset that will integrate 802.11functionality into their products. Dell, Gateway, IBM and others have announced initiatives tointegrate wireless technology into their laptops. T-Mobile, Boingo, Wayport and dozens ofothers have deployed hotspots in Starbucks, Borders, and Kinkos locations as well as hotels,airports and other public venues across the world. Almost every University has deployed somekind of wireless initiatives, with high schools and elementary schools following in theirfootsteps. Millions of home users have discovered the joys of wireless networking. Nowbusinesses everywhere are getting on board as well.

The bottom line is that wireless is here to stay. The integration of 802.11 into almost allnew laptops and handheld devices, coupled with the explosion in availability of public hotspotshas created a virtuous cycle of large-scale wireless proliferation. This invisible, yetinescapable flood of radio waves has landed squarely in our homes and businesses where itpresents a whole new security challenge. How do we embrace the joys of wireless networks whilewe maintain an essential balance with the security needs of our organization?

This book is all about understanding the technology, recognizing the security risks andimplementing a responsible and realistic game plan for safe and secure wireless communication.

WhyI Wrote This Book

Although I had seen many demonstrations of wireless networks, it wasn't until the summer of2001, that I found my true inspiration. At a large security conference, after listening tospeakers talk about community wireless networks, WLAN security and other wireless topics, Icame back home energized and decided it was time to put that spirit to work. A few weeks later,I started the San Diego Wireless Users Group with some friends and found my new passion inwireless technology. With the help of countless dedicated volunteers, including Alan Koebrick,John Eder, Eric Bermel, Michael Mee, and others, we hold monthly meetings with presentations ona variety of topics to share our passion for learning, meet likeminded wireless enthusiasts andhelp one other learn more about this wonderful technology. I've always enjoyed being a "tinkerer," eager to learn how things work.I was the kid who took apart the radio (or telephone, or video game) to check out the parts andunderstand how something operated. Wireless LANs were no different. Fundamentally, if you wantto develop a genuine appreciation for the security risks of wireless networks, you have to rollup your sleeves, get some wireless components together and play.

I wrote this book to go beyond the "WEP is bad" headlines and dig a little deeper tounderstand exactly what was happening under the hood and what to do about it.

Organization

The journey of How Secure is Your Wireless Network? begins with an introduction to wirelesssecurity including a detailed review of the risks and attacks. Next, we move into a tour of thenative 802.11 security solutions. Finally, we explore a variety of hands-on deploymentsolutions.

Here is an overview of each chapter--

Chapter 1 is a review of the general wireless landscape. We begin to ask some of the keyquestions that will lay a foundation for the rest of the book. In particular, we look at howsecurity decisions are affected by factors such as deployment size, mobility needs and othersecurity design requirements. We also review SSID broadcasts, MAC filtering, and Shared KeyAuthentication.

Chapter 2 starts with a stroll down memory lane as we outline some of the history of the802.11 protocol including 802.11 (1997), Direct Sequence Spread Spectrum (DSSS), and FrequencyHopping Spread Spectrum (FHSS). We take a look at 802.11 a, b and g and some of theirperformance characteristics. Next, we dig deeper into the 802.11 protocol with a review ofarchitecture topologies ("Infrastructure" and "Ad-Hoc" modes) as well as CSMA/CA, RTS/CTS andFragmentation.

Chapter 3 is where we jump into a detailed review of WEP and its vulnerabilities. Thisincludes a description and explanation of all known WEP attacks.

Chapter 4 describes "War Driving," including all of the hardware, software, tools and techniques so you can understand how to discover Access Points on your own. We include adiscussion of War Chalking and the ethical considerations of War Driving.

Chapter 5 discusses 802.11i, WPA, TKIP and AES. In this Chapter, we dig a little deeperinto WEP vulnerabilities and ways in which we can mitigate the risk with newer technologies.This includes a description of new encryption methods such as TKIP, AES and other 802.11igoodies.

Chapter 6 follows up on Chapter 5 with a detailed analysis of how 802.1x works, as well asa review of popular EAP types and guidelines to help you choose which one is best for yourparticular situation.

Chapter 7 focuses on transitioning between the "under the hood" theme in the first half ofthe book, into the "hands-on" theme of the second half of the book. In this Chapter we discussthe basic security architecture considerations when connecting the WLAN to the wired networkand moving from theory to application.

Chapter 8 discusses VPNs, a comparison of various technologies and a step-by-stepdescription of how to implement a Microsoft VPN solution.

Chapter 9 talks about securing home environments. It includes a step-by-step guide tobuilding a Linux Embedded Appliance Firewall (LEAF), Sputnik and ReefEdge's Dolphin.

Chapter 10 revisits 802.1x and discusses security in an enterprise environment. Thestep-by-step instructions describe how to deploy 802.1x using Microsoft as a Supplicant andAuthentication Server, with a Cisco AP as the Authenticator.

In Chapter 11 we review 802.11 in a public hotspot environment. For our step-by-stepproject, we describe how to build a Linux based AP using HostAP, NoCat and LEAF.

Appendix A offers an introdcution to RF. Appendix B discusses various 802.11 frame types.Appendix C gives a detailed overview of community wireless networking. And finally, in AppendixD, you'll find detailed instructions, with illustrations, on how to build a working wirelessantenna out of a cylindrical potato-chip can.

Thank you for choosing this book.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted February 29, 2004

    Excellent Beginner - Intermediate Level Coverage of the WLAN Security Terrain

    Wonderfully informative book, well structured in taking the reader through the development of security for WLAN's. This book could form the framework for a college WLAN Security 101 course syllabus. The book is comprised of 11 Chapters and for all intents and purposes two sections. The first section contains wireless communication security concepts and the state of security in the wireless industry; and the second section contains practical application solutions to secure (or prohibit the use of) the home or office WLAN. The only addition I would like to see in the book, is a glossary of terms.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)