6. Summary and Conclusions
This chapter began with some fundamental concepts of wireless network security. The chapter outlined the main security risks for an enterprise to deploy intranets and extranets. The chapter further described some security vulnerabilities in the TCP/IP protocol suite that gives attackers many opportunities for malicious attacks on Internet connected computers. Finally, the chapter also presented the methods and techniques that attackers use to circumvent wireless network security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
7. References
“General Network Security Concepts,” GeoCities, Copyright © 2005 Yahoo! Inc. All rights reserved. Yahoo! Inc., 701 First Avenue, Sunnyvale, CA 94089, 2004.
John R. Vacca, Public Key Infrastructure: Building Trusted Applications and Web Servicess, Auerbach Publications, 2004.
John R. Vacca, Firewalls: Jumpstart for Network and Systems Administrators, Digital Press, 2004.
Rights and permissions
Copyright information
© 2006 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2006). Providing Wireless Network Security Solutions for ISP Intranet, Internet and E-Commerce. In: Guide to Wireless Network Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-29845-0_29
Download citation
DOI: https://doi.org/10.1007/978-0-387-29845-0_29
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-95425-7
Online ISBN: 978-0-387-29845-0
eBook Packages: Computer ScienceComputer Science (R0)