- 1
- 2
- Table of Contents
- Table of Contents
- BackCover
- Caution Wireless Networking--Preventing a Data Disaster
- Introduction
- How This Book Is Organized
- Part I: Understanding the Threat
- Chapter 1: A Brief Overview of Wi-Fi
- Introducing Wi-Fi
- Examining Wi-Fi Equipment
- Equipment Worth Avoiding
- Demystifying Wireless Standards
- Introducing Organizations and Certification
- Summary
- Chapter 2: Network Fundamentals and Security Concerns
- Explaining Networking Terms
- Examining Network Models
- Demystifying the TCPIP Protocols
- Understanding Network Addresses and Names
- Connecting Networks
- Summary
- Chapter 3: The People Behind the Problem
- Separating Hackers from Crackers
- Visiting the Underground Cracker Culture
- What Makes Hackers and Crackers Tick
- Hacker Conventions and Gatherings
- Examining Crackers Tricks
- Entertaining HackingCracking Resources
- Summary
- Chapter 4: Hijacking Wi-Fi
- Hijacking Sessions
- Understanding Rogue Access Points
- Uncovering Denial of Service Attacks
- Summary
- Chapter 5: More Wireless Attacks
- Attacking Hosts
- Sniffing the Network
- Summary
- Chapter 6: Wardriving
- Introducing Wardriving
- Warchalking
- Warspying
- Software for Defense
- More About Wardriving
- Summary
- Chapter 7: Viruses and Wi-Fi
- Understanding Malicious Software
- Examining Computer Viruses
- Exposing Trojan Programs
- Discovering Internet Worms
- Discovering Blended Threats
- Bot Software
- Introducing Spyware
- Investigating Viruses on Handhelds
- Understanding the Hoax Problem
- Summary
- Part II: Protecting Yourself
- Chapter 8: Technical Pitfalls and Solutions
- Discovering Common Wi-Fi Problems
- Detecting and Dealing with Interference
- Defining Interoperability Issues
- Learning About Antennas
- Optimizing Equipment
- Summary
- Chapter 9: Wireless Privacy Concerns
- Why Privacy Matters
- Wi-Fi Privacy Threats
- Demystifying Privacy Policies
- Other Vulnerable Wireless Technology
- Summary
- Chapter 10: Encryption and Wi-Fi
- Introducing Encryption
- Understanding Modern Encryption Techniques
- Debunking Wired Equivalent Privacy (WEP)
- Investigating Wi-Fi Protected Access (WPA)
- Introducing Pretty Good Privacy (PGP)
- Summary
- Chapter 11: Securing Your WLAN
- Understanding WLAN Vulnerabilities
- Changing Dangerous Default Settings
- 1
- 2

