A major, comprehensive professional text/reference for designing and maintaining security and reliability. From basic concepts to designing principles to deployment, all critical concepts and phases are clearly explained and presented. Includes coverage of wireless security testing techniques and prevention techniques for intrusion (attacks). An essential resource for wireless network administrators and developers.Similar to critical system files, host-based IDSes (HIDSes) run directly on the system being monitored and monitor log files. ... Expected behavior must be defined in advance by an automatically developed profile or by a manually developed ... A frequently-updated IDS can alert wireless network managers of known attacks.
|Title||:||Guide to Wireless Network Security|
|Author||:||John R. Vacca|
|Publisher||:||Springer Science & Business Media - 2006-10-16|