You are here: IT-Observer » Articles » Reviews RSS | White Papers |   

Building Secure Wireless Networks with 802.11





If you plan to deploy a wireless network at home or in the office, this book provides an easy to follow step-by-step planning and guidelines for a successful deployment and securing wireless network in any environment you choose.

Authors: Jahanzeb Khan and Anis Khwaja
Pages: 352
Publisher: Wiley
ISBN: 9



About the authors

Jahanzeb Khan is Principal Engineer with RSA Security, Inc., where he is responsible for the research and development of encryption, Public Key Infrastructure, and wireless LAN Security standards. He is active in the 802.11b community and is a member of IEEE International.

Anis Khwaja works in the IT department of a leading financial service firm. Khwaja has more than fifteen years of experience in networking and is currently involved in deployment of 802.11b (Wi-Fi) networks.

The Book

The book consists of four main parts, each one devoted to a particular subject of wireless technology. Each part contains several chapters, which all together provide a step-by-step guide for understanding, deploying and securing an 802.11b wireless network.

The first part introduces the reader to the world of networking in general and wireless networking in particular. It begins with a decent portion of general networking stuff – topologies, standards, protocols and hardware – rather than with wireless network specifics, since general networking background is required for understanding wireless networks. It continues with a similar part dedicated to wireless technology, networks, terms, standards and operation modes. The part ends with the question that is so obvious that it rarely gets asked – “Is Wireless LAN Right for You?” – which makes the reader to think one more time whether a wireless network is indeed the right solution.

Second part’s emphasis is on securing wireless networks. This part consists of two chapters – the first is dedicated to wired LAN network security and the second to wireless LAN network security. The first chapter in this part provides information on various types of attacks as well as common methods, which are used to defense and secure networks. The ending chapter of the second part contains information on the weakness of IEEE 802.11 security standards, WEP (Wired Equivalent Privacy) and its weakness, 802.11X and VPN.

The third part provides information on how to design and deploy a secure wireless network. It starts with an overview on planning a wireless LAN and explanation on how to choose and shop for the right wireless equipment, according to the deployment scenario. It continues with discussion on the actual setup process of the wireless network. For the advance readers, the authors dedicated the last portion of this part to 802.1X authentication mechanism and Virtual Private Network (VPN).

The last part of the book is devoted to various methods of troubleshooting and maintenance of a wireless LAN.

My Opinion

The book is well organized and has a logical structure, which improves the readability and makes an easy to follow step-by-step guide. This book should be read by anyone who is planning to deploy a wireless network in any environment.

Though the book is a great asset, it has a nuisance – I have found many times a repeated material from the prior chapters or parts in the book.



GFI LANguard N.S.S. NEW v8 out now!
Complete network vulnerability management, providing powerful vulnerability scanning, patch management and auditing solution. DOWNLOAD A 30-DAY TRIAL TODAY!

Visit GFI Security Software page for more information.

 

FREE IP PBX: 3CX VOIP Phone System for Windows. No timeouts or limitations

 

Latest News

5 laptop security tips
20.07.07  Laptop theft is a huge problem.

Essential Bluetooth hacking tools
25.05.07  Bluetooth provides an easy way for a wide range of mobile devices to communicate with each other without the need for cables or wires.

DEP for IE7 in Vista
22.05.07  Security tips blog, security-hacks, has posted details on how to enable DEP for Internet Explorer 7 in Vista.

SMB over SSH: Secure File Sharing
18.05.07  Security tips blog, security-hacks, has published an simple guide to share files securely in heterogeneous networks.

Avoid data leaks by clearing the page file
14.05.07  Security-Hacks publishes a useful tip to avoid potential data leaks when you run out of memory.

How to set Master Password in Firefox
11.05.07  Nowadays many web sites require you to type a user name and password before you can enter the site.

How to test your firewall?
10.05.07  Security tips blog, Security-Hacks, has published a compilation of tools to test your firewall: "We’ve compiled a list of tools we believe will be of value to both home users and advance users.

Copyright © IT-Observer Online Publication 2000 - 2007 Top | RSS Feeds | About Us   
Site Meter