Attacks on Wireless LANs About the security of IEEE 802.11 based wireless networks (Paperback)

,
Wireless LANs can be found nearly everywhere today. Most mobile computers ship with built-in wireless LAN hardware by default and most other computers can be equipped with additional hardware. Because all data is transmitted wirelessly, extra security is needed in these networks. This was a concern to the creators of the IEEE 802.11 standard, who designed a simple protocol called WEP which stands for Wired Equivalent Privacy to protect such networks. Unfortunately, the WEP protocol has some serious design flaws and various attacks are possible against WEP protected networks. This book presents nearly all currently known attacks on the WEP protocol, including their theoretical background and their implementation. This book is intended for network operators, who want to learn more about wireless security, and also for cryptographers, who want to understand the theoretical background of these attacks.

R1,567

Or split into 4x interest-free payments of 25% on orders over R50
Learn more

Discovery Miles15670
Mobicred@R147pm x 12* Mobicred Info
Free Delivery
Delivery AdviceShips in 10 - 15 working days



Product Description

Wireless LANs can be found nearly everywhere today. Most mobile computers ship with built-in wireless LAN hardware by default and most other computers can be equipped with additional hardware. Because all data is transmitted wirelessly, extra security is needed in these networks. This was a concern to the creators of the IEEE 802.11 standard, who designed a simple protocol called WEP which stands for Wired Equivalent Privacy to protect such networks. Unfortunately, the WEP protocol has some serious design flaws and various attacks are possible against WEP protected networks. This book presents nearly all currently known attacks on the WEP protocol, including their theoretical background and their implementation. This book is intended for network operators, who want to learn more about wireless security, and also for cryptographers, who want to understand the theoretical background of these attacks.

Customer Reviews

No reviews or ratings yet - be the first to create one!

Product Details

General

Imprint

VDM Verlag

Country of origin

Germany

Release date

December 2008

Availability

Expected to ship within 10 - 15 working days

First published

December 2008

Authors

,

Dimensions

229 x 152 x 7mm (L x W x T)

Format

Paperback - Trade

Pages

136

ISBN-13

978-3-639-04638-0

Barcode

9783639046380

Categories

LSN

3-639-04638-2



Trending On Loot