Books & Videos

Table of Contents

  1. 802.11 Security Basics

    1. Chapter 1 A Wireless World

      1. What Is Wireless?
      2. Radio Transmission
      3. Inherent Insecurity
      4. 802.11
      5. Structure of 802.11 MAC
      6. WEP
      7. Problems with WEP
      8. Is It Hopeless?
    2. Chapter 2 Attacks and Risks

      1. An Example Network
      2. Denial-of-Service Attacks
      3. Man-in-the-Middle Attacks
      4. Illicit Use
      5. Wireless Risks
      6. Knowing Is Half the Battle
  2. Station Security

    1. Chapter 3 Station Security

      1. Client Security Goals
      2. Audit Logging
      3. Security Updates
    2. Chapter 4 FreeBSD Station Security

      1. FreeBSD Client Setup
    3. Chapter 5 Linux Station Security

      1. Linux Client Setup
      2. Kernel Configuration
      3. OS Protection
      4. Audit Logging
      5. Secure Communication
    4. Chapter 6 OpenBSD Station Security

      1. OpenBSD Client Setup
      2. Kernel Configuration
      3. OS Protection
      4. Audit Logging
    5. Chapter 7 Mac OS X Station Security

      1. Mac OS X Setup
      2. OS Protection
      3. Audit Logging
    6. Chapter 8 Windows Station Security

      1. Windows Client Setup
      2. OS Protection
      3. Audit Logging
      4. Secure Communication
  3. Access Point Security

    1. Chapter 9 Setting Up an Access Point

      1. General Access Point Security
      2. Setting Up a Linux Access Point
      3. Setting Up a FreeBSD Access Point
      4. Setting Up an OpenBSD Access Point
      5. Taking It to the Gateway
  4. Gateway Security

    1. Chapter 10 Gateway Security

      1. Gateway Architecture
      2. Secure Installation
      3. Firewall Rule Creation
      4. Audit Logging
    2. Chapter 11 Building a Linux Gateway

      1. Laying Out the Network
      2. Building the Gateway
      3. Configuring Network Interfaces
      4. Building the Firewall Rules
      5. MAC Address Filtering
      6. DHCP
      7. DNS
      8. Static ARP
      9. Audit Logging
      10. Wrapping Up
    3. Chapter 12 Building a FreeBSD Gateway

      1. Building the Gateway
      2. Building the Firewall Rules
      3. Rate Limiting
      4. DHCP
      5. DNS
      6. Static ARP
      7. Auditing
    4. Chapter 13 Building an OpenBSD Gateway

      1. Building the Gateway
      2. Building the Firewall Rules
      3. Rate Limiting
      4. DHCP
      5. DNS
      6. Static ARP
      7. Auditing
    5. Chapter 14 Authentication and Encryption

      1. Portals
      2. IPsec VPN
      3. 802.1x
    6. Chapter 15 Putting It All Together

      1. Pieces of a Coherent System
      2. User Knowledge
      3. Looking Ahead
  1. Colophon