Dekorationsartikel gehören nicht zum Leistungsumfang.
Sprache:
Englisch
45,85 €*
Versandkostenfrei per Post / DHL
Lieferzeit 2-3 Wochen
Kategorien:
Beschreibung
Foreword; Preface; 1. Introduction to Wireless Networking; Why Wireless?; What Makes Wireless Networks Different; A Network by Any Other Name...; 2. Overview of 802.11 Networks; IEEE 802 Network Technology Family Tree; 802.11 Nomenclature and Design; 802.11 Network Operations; Mobility Support; 3. 802.11 MAC Fundamentals; Challenges for the MAC; MAC Access Modes and Timing; Contention-Based Access Using the DCF; Fragmentation and Reassembly; Frame Format; Encapsulation of Higher-Layer Protocols Within 802.11; Contention-Based Data Service; Frame Processing and Bridging; 4. 802.11 Framing in Detail; Data Frames; Control Frames; Management Frames; Frame Transmission and Association and Authentication States; 5. Wired Equivalent Privacy (WEP); Cryptographic Background to WEP; WEP Cryptographic Operations; Problems with WEP; Dynamic WEP; 6. User Authentication with 802.1X; The Extensible Authentication Protocol; EAP Methods; 802.1X: Network Port Authentication; 802.1X on Wireless LANs; 7. 802.11i: Robust Security Networks, TKIP, and CCMP; The Temporal Key Integrity Protocol (TKIP); Counter Mode with CBC-MAC (CCMP); Robust Security Network (RSN) Operations; 8. Management Operations; Management Architecture; Scanning; Authentication; Preauthentication; Association; Power Conservation; Timer Synchronization; Spectrum Management; 9. Contention-Free Service with the PCF; Contention-Free Access Using the PCF; Detailed PCF Framing; Power Management and the PCF; 10. Physical Layer Overview; Physical-Layer Architecture; The Radio Link; RF Propagation with 802.11; RF Engineering for 802.11; 11. The Frequency-Hopping (FH) PHY; Frequency-Hopping Transmission; Gaussian Frequency Shift Keying (GFSK); FH PHY Convergence Procedure (PLCP); Frequency-Hopping PMD Sublayer; Characteristics of the FH PHY; 12. The Direct Sequence PHYs: DSSS and HR/DSSS (802.11b); Direct Sequence Transmission; Differential Phase Shift Keying (DPSK); The "Original" Direct Sequence PHY; Complementary Code Keying; High Rate Direct Sequence PHY; 13. 802.11a and 802.11j: 5-GHz OFDM PHY; Orthogonal Frequency Division Multiplexing (OFDM); OFDM as Applied by 802.11a; OFDM PLCP; OFDM PMD; Characteristics of the OFDM PHY; 14. 802.11g: The Extended-Rate PHY (ERP); 802.11g Components; ERP Physical Layer Convergence (PLCP); ERP Physical Medium Dependent (PMD) Layer; 15. A Peek Ahead at 802.11n: MIMO-OFDM; Common Features; WWiSE; TGnSync; Comparison and Conclusions; 16. 802.11 Hardware; General Structure of an 802.11 Interface; Implementation-Specific Behavior; Reading the Specification Sheet; 17. Using 802.11 on Windows; Windows XP; Windows 2000; Windows Computer Authentication; 18. 802.11 on the Macintosh; The AirPort Extreme Card; 802.1X on the AirPort; 19. Using 802.11 on Linux; PCMCIA Support on Linux; Linux Wireless Extensions and Tools; Agere (Lucent) Orinoco; Atheros-Based cards and MADwifi; 802.1X on Linux with xsupplicant; 20. Using 802.11 Access Points; General Functions of an Access Point; Power over Ethernet (PoE); Selecting Access Points; Cisco 1200 Access Point; Apple AirPort; 21. Logical Wireless Network Architecture; Evaluating a Logical Architecture; Topology Examples; Choosing Your Logical Architecture; 22. Security Architecture; Security Definition and Analysis; Authentication and Access Control; Ensuring Secrecy Through Encryption; Selecting Security Protocols; Rogue Access Points; 23. Site Planning and Project Management; Project Planning and Requirements; Network Requirements; Physical Layer Selection and Design; Planning Access-Point Placement; Using Antennas to Tailor Coverage; 24. 802.11 Network Analysis; Network Analyzers; Ethereal; 802.11 Network Analysis Checklist; Other Tools; 25. 802.11 Performance Tuning; 802.11 Performance Calculations; Improving Performance; Tunable 802.11 Parameters; 26. Conclusions and Predictions; Standards Work; Current Trends in Wireless Networking; The End; Glossary; Index; 001; [...]X; TOCP; Preface; Chapter 1. C-sharp 2.0; Create a Type-Safe List Using a Generic Collection; Create Your Own Generic Collection; Implement the Collection Interfaces; Enumerate Using Generic Iterators; Implement Get Enumerator with Complex Data Structures; Simplify Your Code with Anonymous Methods; Hide Designer Code with Partial Types; Create Static Classes; Express Null Values with Nullable Types; Access Objects in the Global Namespace; Limit Access Within Properties; Gain Flexibility with Delegate Covariance and Contravariance; Chapter 2. Visual Studio 2005; Configure and Save Your Developer Environment; Configure Your Application; Make the Editor Work for You; Use Refactoring to Speed Revision of Your Code; Use Code Snippets to Save Typing; Examine Objects While Debugging Them; Visualize XML Data; Diagnose Exceptions; Chapter 3. Windows Applications; Add Tool Strips to Your Application; Allow Valid Input Only; Create Auto-Complete Text Boxes; Play Sounds; Create Split Windows; Create Data-Driven Forms; Create Safe Asynchronous Tasks; Put the Web in a Window; Enable One-Click Deployment; Chapter 4. Web Applications; Develop Web Apps Without IIS; Provide Forms-Based Security Without Code; Add Roles to [...] Accounts; Create Personalized Web Sites; Personalize with Complex Types; Add Anonymous Personalization to Your Site; Let Users Personalize Your Site with Themes; Unify Your Look and Feel with Master Pages; Chapter 5. Data; Bind to Data Without Writing Code; Create Detail Pages; Create Master Detail Records; Get Database Statistics; Batch Updates to Improve Performance; Bind to an XmlDataSource Control; Improve XML Manipulation with XPathDocument; Select Within XPathDocument Using XPath; Index; 001; [...]; TOCP; Preface; Chapter 1. The Problem with the Blue E; Long, Long Ago-in Internet Time; Mosaic; Netscape; Microsoft, IE, and the Browser Wars; A Long Shot That Paid Off; IE and Windows: Joined at the Hip; The Blue E: The Achilles Heel of Windows Security; The Red Lizard and Its Children; Where to Learn More; Chapter 2. Installing and Configuring Firefox; Installing Firefox; Running Firefox for the First Time; Starting Firefox; Just the Way You Want It: Options; Customize Your Toolbars; Help!; Firefox Profiles; Where to Learn More; Chapter 3. Firefox Features; Getting Started with Firefox; Making Life Easier; Sidebars; Managers; Where to Learn More; Chapter 4. Killer Firefox Add-Ons; Installing Plug-Ins for Multimedia and More; Changing the Look and Feel with Themes; Adding Features to Firefox with Extensions; Where to Learn More; Chapter 5. Advanced Firefox; Searching; Live Bookmarks; Counteracting Web Annoyances; Safety and Security; Advanced Configuration; Contribute!; Where to Learn More; Appendix A. Other Web Browsers; Appendix B. Firefox Options; Index
Foreword; Preface; 1. Introduction to Wireless Networking; Why Wireless?; What Makes Wireless Networks Different; A Network by Any Other Name...; 2. Overview of 802.11 Networks; IEEE 802 Network Technology Family Tree; 802.11 Nomenclature and Design; 802.11 Network Operations; Mobility Support; 3. 802.11 MAC Fundamentals; Challenges for the MAC; MAC Access Modes and Timing; Contention-Based Access Using the DCF; Fragmentation and Reassembly; Frame Format; Encapsulation of Higher-Layer Protocols Within 802.11; Contention-Based Data Service; Frame Processing and Bridging; 4. 802.11 Framing in Detail; Data Frames; Control Frames; Management Frames; Frame Transmission and Association and Authentication States; 5. Wired Equivalent Privacy (WEP); Cryptographic Background to WEP; WEP Cryptographic Operations; Problems with WEP; Dynamic WEP; 6. User Authentication with 802.1X; The Extensible Authentication Protocol; EAP Methods; 802.1X: Network Port Authentication; 802.1X on Wireless LANs; 7. 802.11i: Robust Security Networks, TKIP, and CCMP; The Temporal Key Integrity Protocol (TKIP); Counter Mode with CBC-MAC (CCMP); Robust Security Network (RSN) Operations; 8. Management Operations; Management Architecture; Scanning; Authentication; Preauthentication; Association; Power Conservation; Timer Synchronization; Spectrum Management; 9. Contention-Free Service with the PCF; Contention-Free Access Using the PCF; Detailed PCF Framing; Power Management and the PCF; 10. Physical Layer Overview; Physical-Layer Architecture; The Radio Link; RF Propagation with 802.11; RF Engineering for 802.11; 11. The Frequency-Hopping (FH) PHY; Frequency-Hopping Transmission; Gaussian Frequency Shift Keying (GFSK); FH PHY Convergence Procedure (PLCP); Frequency-Hopping PMD Sublayer; Characteristics of the FH PHY; 12. The Direct Sequence PHYs: DSSS and HR/DSSS (802.11b); Direct Sequence Transmission; Differential Phase Shift Keying (DPSK); The "Original" Direct Sequence PHY; Complementary Code Keying; High Rate Direct Sequence PHY; 13. 802.11a and 802.11j: 5-GHz OFDM PHY; Orthogonal Frequency Division Multiplexing (OFDM); OFDM as Applied by 802.11a; OFDM PLCP; OFDM PMD; Characteristics of the OFDM PHY; 14. 802.11g: The Extended-Rate PHY (ERP); 802.11g Components; ERP Physical Layer Convergence (PLCP); ERP Physical Medium Dependent (PMD) Layer; 15. A Peek Ahead at 802.11n: MIMO-OFDM; Common Features; WWiSE; TGnSync; Comparison and Conclusions; 16. 802.11 Hardware; General Structure of an 802.11 Interface; Implementation-Specific Behavior; Reading the Specification Sheet; 17. Using 802.11 on Windows; Windows XP; Windows 2000; Windows Computer Authentication; 18. 802.11 on the Macintosh; The AirPort Extreme Card; 802.1X on the AirPort; 19. Using 802.11 on Linux; PCMCIA Support on Linux; Linux Wireless Extensions and Tools; Agere (Lucent) Orinoco; Atheros-Based cards and MADwifi; 802.1X on Linux with xsupplicant; 20. Using 802.11 Access Points; General Functions of an Access Point; Power over Ethernet (PoE); Selecting Access Points; Cisco 1200 Access Point; Apple AirPort; 21. Logical Wireless Network Architecture; Evaluating a Logical Architecture; Topology Examples; Choosing Your Logical Architecture; 22. Security Architecture; Security Definition and Analysis; Authentication and Access Control; Ensuring Secrecy Through Encryption; Selecting Security Protocols; Rogue Access Points; 23. Site Planning and Project Management; Project Planning and Requirements; Network Requirements; Physical Layer Selection and Design; Planning Access-Point Placement; Using Antennas to Tailor Coverage; 24. 802.11 Network Analysis; Network Analyzers; Ethereal; 802.11 Network Analysis Checklist; Other Tools; 25. 802.11 Performance Tuning; 802.11 Performance Calculations; Improving Performance; Tunable 802.11 Parameters; 26. Conclusions and Predictions; Standards Work; Current Trends in Wireless Networking; The End; Glossary; Index; 001; [...]X; TOCP; Preface; Chapter 1. C-sharp 2.0; Create a Type-Safe List Using a Generic Collection; Create Your Own Generic Collection; Implement the Collection Interfaces; Enumerate Using Generic Iterators; Implement Get Enumerator with Complex Data Structures; Simplify Your Code with Anonymous Methods; Hide Designer Code with Partial Types; Create Static Classes; Express Null Values with Nullable Types; Access Objects in the Global Namespace; Limit Access Within Properties; Gain Flexibility with Delegate Covariance and Contravariance; Chapter 2. Visual Studio 2005; Configure and Save Your Developer Environment; Configure Your Application; Make the Editor Work for You; Use Refactoring to Speed Revision of Your Code; Use Code Snippets to Save Typing; Examine Objects While Debugging Them; Visualize XML Data; Diagnose Exceptions; Chapter 3. Windows Applications; Add Tool Strips to Your Application; Allow Valid Input Only; Create Auto-Complete Text Boxes; Play Sounds; Create Split Windows; Create Data-Driven Forms; Create Safe Asynchronous Tasks; Put the Web in a Window; Enable One-Click Deployment; Chapter 4. Web Applications; Develop Web Apps Without IIS; Provide Forms-Based Security Without Code; Add Roles to [...] Accounts; Create Personalized Web Sites; Personalize with Complex Types; Add Anonymous Personalization to Your Site; Let Users Personalize Your Site with Themes; Unify Your Look and Feel with Master Pages; Chapter 5. Data; Bind to Data Without Writing Code; Create Detail Pages; Create Master Detail Records; Get Database Statistics; Batch Updates to Improve Performance; Bind to an XmlDataSource Control; Improve XML Manipulation with XPathDocument; Select Within XPathDocument Using XPath; Index; 001; [...]; TOCP; Preface; Chapter 1. The Problem with the Blue E; Long, Long Ago-in Internet Time; Mosaic; Netscape; Microsoft, IE, and the Browser Wars; A Long Shot That Paid Off; IE and Windows: Joined at the Hip; The Blue E: The Achilles Heel of Windows Security; The Red Lizard and Its Children; Where to Learn More; Chapter 2. Installing and Configuring Firefox; Installing Firefox; Running Firefox for the First Time; Starting Firefox; Just the Way You Want It: Options; Customize Your Toolbars; Help!; Firefox Profiles; Where to Learn More; Chapter 3. Firefox Features; Getting Started with Firefox; Making Life Easier; Sidebars; Managers; Where to Learn More; Chapter 4. Killer Firefox Add-Ons; Installing Plug-Ins for Multimedia and More; Changing the Look and Feel with Themes; Adding Features to Firefox with Extensions; Where to Learn More; Chapter 5. Advanced Firefox; Searching; Live Bookmarks; Counteracting Web Annoyances; Safety and Security; Advanced Configuration; Contribute!; Where to Learn More; Appendix A. Other Web Browsers; Appendix B. Firefox Options; Index
Details
Erscheinungsjahr: | 2005 |
---|---|
Medium: | Taschenbuch |
Inhalt: | Einband - flex.(Paperback) |
ISBN-13: | 9780596100520 |
ISBN-10: | 0596100523 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: | Matthew Gast |
Auflage: | 2. Auflage |
Hersteller: | O'Reilly Media |
Verantwortliche Person für die EU: | Smart Books, ein Imprint der 'dpunkt.verlag GmbH', Wieblinger Weg 17, D-69123 Heidelberg, hallo@dpunkt.de |
Abbildungen: | w. figs. |
Maße: | 232 x 174 x 36 mm |
Von/Mit: | Matthew Gast |
Erscheinungsdatum: | 28.05.2005 |
Gewicht: | 1,16 kg |
Details
Erscheinungsjahr: | 2005 |
---|---|
Medium: | Taschenbuch |
Inhalt: | Einband - flex.(Paperback) |
ISBN-13: | 9780596100520 |
ISBN-10: | 0596100523 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: | Matthew Gast |
Auflage: | 2. Auflage |
Hersteller: | O'Reilly Media |
Verantwortliche Person für die EU: | Smart Books, ein Imprint der 'dpunkt.verlag GmbH', Wieblinger Weg 17, D-69123 Heidelberg, hallo@dpunkt.de |
Abbildungen: | w. figs. |
Maße: | 232 x 174 x 36 mm |
Von/Mit: | Matthew Gast |
Erscheinungsdatum: | 28.05.2005 |
Gewicht: | 1,16 kg |
Sicherheitshinweis