Chapter 4. Cisco Unified Wireless LAN Security Fundamentals
“New Vulnerability Allows Hackers to Penetrate Wireless Networks!” screams the headline in the newspaper or periodical. Perhaps the accompanying article describes some new theoretical vulnerability announced by a security research group that (surprise!) offers wireless LAN (WLAN) security consulting services. Or maybe it’s a WLAN vendor that, quite naturally, not only “discovered” the new vulnerability but also offers the industry’s “only” or “best” solution. Or maybe the accompanying article contains a sensationalistic description of how some “white hat” hacker demonstrated a new tool to exploit a WLAN or network attack vector at a security conference. Quite often, what’s “new” is ...
Get Controller-Based Wireless LAN Fundamentals: An end-to-end reference guide to design, deploy, manage, and secure 802.11 wireless networks now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.