tailieunhanh - 802.11® Wireless Networks: The Definitive Guide phần 1
Bạn đã tạo ra ba quy tắc xác thực cần thiết, email, và URL. Tất cả bạn phải làm gì để áp dụng chúng để tạo thành một là để chèn một thuộc tính mới, được gọi là xác nhận, và xác định quy tắc mà bạn muốn áp dụng. Sau đây là một ví dụ về quy tắc yêu cầu. | Wireless Networks The Definitive Guide By Matthew Gast Publisher O Reilly Pub Date April 2002 ISBN 0-596-00183-5 Pages 464 - Joy As a network administrator architect or security professional you need to understand the capabilities limitations and risks associated with integrating wireless LAN technology into your current infrastructure. This practical guide provides all the information necessary to analyze and deploy wireless networks with confidence. It s the only source that offers a full spectrum view of from the minute details of the specification to deployment monitoring and troubleshooting. O REILLY Atíilỉhett s. Gast Creatbif ciìỉỉl Administering Wireless Networks The Definitive Guide - v --- Wireless Networks Copyright Preface Prometheus Untethered The Possibilities of Wireless LANs Audience Overture for Book in Black and White Opus 2 Conventions Used in This Book How to Contact Us Acknowledgments Chapter 1. Introduction to Wireless Networks Section . Why Wireless Section . A Network by Any Other Name. Chapter 2. Overview of Networks Section . IEEE 802 Network Technology Family Tree Section . Nomenclature and Design Section . Network Operations Section . Mobility Support Chapter 3. The MAC Section . Challenges for the MAC Section . MAC Access Modes and Timing Section . Contention-Based Access Using the DCF Section . Fragmentation and Reassembly Section . Frame Format Section . Encapsulation of Higher-Layer Protocols Within Section . Contention-Based Data Service Chapter 4. Framing in Detail Section . Data Frames Section . Control Frames Section . Management Frames Section . Frame Transmission and Association and Authentication States Chapter 5. Wired Equivalent Privacy WEP Section . Cryptographic Background to WEP Section . WEP Cryptographic Operations Section . Problems with WEP Section . Conclusions and Recommendations Chapter 6. Security
đang nạp các trang xem trước