Wireless Security
McGraw-Hill Professional (Verlag)
978-0-07-222286-9 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
Get full details on major mobile/wireless clients and operating systems--including Windows CE, Palm OS, UNIX, and Windows. You’ll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security -- the most trusted name in e-security -- this is your one-stop guide to wireless security.
Merritt Maxim (Bedford, MA) has more than 4 years of experience in the information security industry, most recently as a product manager for wireless security at RSA Security, Inc. David Pollino (Walnut Creek, CA) is a senior security consultant at @stake, Inc. He has extensive networking experience including working for a tier 1 ISP architecting and deploying secure networks for Fortune 500 companies. David leads the @stake Center of Excellence focusing on wireless technologies such as 802.11x, WAP and GPRS. Recent projects include helping design and oversee the security architecture for a large European ASP and assisting with the security architecture for a wireless provider.
Part 1: Introduction to Wireless 1: Welcome to a Wireless World 2: Wireless Threats 3: Introduction to Wireless Security Protocols and Cryptography 4: Security Considerations for Wireless Devices Part 2: Wireless Technologies and Applications 5: Introduction to Cellular Networks 6: Introduction to Wireless Data Networks 7: Wireless Standards and Technologies Part 3: Wireless Deployment Strategies 8: Implementing Wireless LANs: Security Considerations 9: Enabling Secure Wireless Access to Data 10: Real Examples from the Wireless World 11: The Wireless Future 12: Assessing Wireless Local Area Networks (LANs) Appendix A: Glossary of Wireless Terms
Erscheint lt. Verlag | 16.5.2002 |
---|---|
Zusatzinfo | 1 |
Sprache | englisch |
Maße | 185 x 231 mm |
Gewicht | 730 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
Informatik ► Weitere Themen ► Hardware | |
ISBN-10 | 0-07-222286-7 / 0072222867 |
ISBN-13 | 978-0-07-222286-9 / 9780072222869 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich