16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

x<br />

Contents<br />

20.8 Summary ...............................................................................................................501<br />

20.9 Solutions Fast Track ..............................................................................................501<br />

Chapter 21: Implementing Advanced <strong>Wireless</strong> <strong>Security</strong> ...............................................503<br />

21.1 Introduction ...........................................................................................................503<br />

21.2 Implementing WiFi Protected Access (WPA).......................................................503<br />

21.3 Implementing a <strong>Wireless</strong> Gateway with Reef Edge Dolphin................................511<br />

21.4 Implementing a VPN on a Linksys WRV54G VPN<br />

Broadband Router .................................................................................................525<br />

21.5 Implementing RADIUS with Cisco LEAP ...........................................................536<br />

21.6 Understanding and Configuring 802.1X RADIUS Authentication ......................555<br />

21.7 Summary ...............................................................................................................579<br />

21.8 Solutions Fast Track ..............................................................................................580<br />

IV: Other <strong>Wireless</strong> Technology .......................................................................................583<br />

Chapter 22: Home Network <strong>Security</strong> .............................................................................585<br />

22.1 Introduction ...........................................................................................................585<br />

22.2 The Basics of <strong>Wireless</strong> Networks .........................................................................586<br />

22.3 Basic <strong>Wireless</strong> Network <strong>Security</strong> Measures .........................................................589<br />

22.4 Additional Hotspot <strong>Security</strong> Measures .................................................................596<br />

22.5 Summary ...............................................................................................................599<br />

22.6 Additional Resources ............................................................................................600<br />

Chapter 23: <strong>Wireless</strong> Embedded System <strong>Security</strong> ..........................................................601<br />

23.1 <strong>Wireless</strong> Technologies...........................................................................................601<br />

23.2 Bluetooth ...............................................................................................................609<br />

23.3 ZigBee ...................................................................................................................610<br />

23.4 <strong>Wireless</strong> Technologies and the Future ..................................................................614<br />

Chapter 24: RFID <strong>Security</strong>.............................................................................................615<br />

24.1 Introduction ...........................................................................................................615<br />

24.2 RFID <strong>Security</strong> in General .....................................................................................616<br />

24.3 RFID Radio Basics................................................................................................620<br />

24.4 Why Use RFID? ....................................................................................................621<br />

24.5 RFID Architecture.................................................................................................622<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!