博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
How to Cheat at Securing a Wireless Network
阅读量:4231 次
发布时间:2019-05-26

本文共 1228 字,大约阅读时间需要 4 分钟。

版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。 - topmvp

Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors:

*Denial of service (DoS) and other network layer attacks
*Unauthorized access across the perimeter and within the organization Application layer intrusions and attacks, both from within and outside the network Extended connectivity through remote access and extranets
*An increase in unmanaged or ill-managed endpoint devices
*New applications like VoIP, instant messaging, and peer-to-peer

This book provides the busy network administrator with best-practice solutions address these threats and to maintain a secure and accessible wireless network. The book endorses the principle that the best strategy is to deploy multiple layers of security, each reinforcing the other. Yet it never strays from its emphasis on the practical; that any tool or methodology that is deployed must work reliably, allow sufficient access, and require a minimal amount of maintenance

http://rapidshare.com/files/52842313/1597490873.zip
你可能感兴趣的文章
踩坑记 | Flink 天级别窗口中存在的时区问题
查看>>
用了 History Server,妈妈再也不用担心我的 Flink 作业半夜挂了
查看>>
强烈推荐三本 Spark 新书籍
查看>>
ClickHouse 知识讲解
查看>>
ClickHouse 如何玩转时序数据
查看>>
Flink 在腾讯视频的应用实践
查看>>
Flink SQL 1.11 on Zeppelin 平台化实践
查看>>
通过项目逐步深入了解Mybatis<三>
查看>>
奇怪的Java题:为什么128 == 128返回为False,而127 == 127会返回为True?
查看>>
通过项目逐步深入了解Spring MVC(一)
查看>>
java读取文件
查看>>
【二叉树】二叉树打印
查看>>
【字符串】字符串逆序
查看>>
【字符串】判断两字符串是否互为旋转词?
查看>>
【排序】时间复杂度为O(N^2)的排序——冒泡、选择和插入排序
查看>>
Typora Markdown 语法
查看>>
【IO】程序访问文件的几种方式
查看>>
Java NIO 系列教程
查看>>
fork() || fork()和fork() && fork()笔试题
查看>>
Qt:事件处理
查看>>