|
|
|||
|
||||
OverviewFull Product DetailsAuthor: Jim GeierPublisher: John Wiley and Sons Ltd Imprint: John Wiley & Sons Ltd Dimensions: Width: 18.50cm , Height: 2.60cm , Length: 25.30cm Weight: 0.720kg ISBN: 9780470168608ISBN 10: 0470168609 Pages: 330 Publication Date: 04 April 2008 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Unknown Availability: In Print Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock. Table of ContentsIntroduction. Part I Concepts. Chapter 1 Network Architecture Concepts. Chapter 2 Port-Based Authentication Concepts. Part II Standards and Protocols. Chapter 3 EAPOL Protocol. Chapter 4 RADIUS Protocols. Chapter 5 EAP-Methods Protocol. Part III Implementation. Chapter 6 Configuring Supplicants. Chapter 7 Configuring Authenticators. Chapter 8 Configuring Authentication Servers. Chapter 9 Troubleshooting. Appendix RFC 3748: Extensible Authentication Protocol (EAP). Glossary. Index.ReviewsAuthor InformationJim Geier is the founder of Wireless-Nets, Ltd., and a 25-year expert on network-based systems. His experience includes analysis, design, software development, installation, and support for secure wireless networks in both public and private use. He has written several books, articles, and tutorials on wireless LANs and Wi-Fi. Tab Content 6Author Website:Countries AvailableAll regions |