Wireless Security
McGraw-Hill Professional (Verlag)
9780072222869 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
Get full details on major mobile/wireless clients and operating systems--including Windows CE, Palm OS, UNIX, and Windows. You’ll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security -- the most trusted name in e-security -- this is your one-stop guide to wireless security.
Merritt Maxim (Bedford, MA) has more than 4 years of experience in the information security industry, most recently as a product manager for wireless security at RSA Security, Inc. David Pollino (Walnut Creek, CA) is a senior security consultant at @stake, Inc. He has extensive networking experience including working for a tier 1 ISP architecting and deploying secure networks for Fortune 500 companies. David leads the @stake Center of Excellence focusing on wireless technologies such as 802.11x, WAP and GPRS. Recent projects include helping design and oversee the security architecture for a large European ASP and assisting with the security architecture for a wireless provider.
Part 1: Introduction to Wireless 1: Welcome to a Wireless World 2: Wireless Threats 3: Introduction to Wireless Security Protocols and Cryptography 4: Security Considerations for Wireless Devices Part 2: Wireless Technologies and Applications 5: Introduction to Cellular Networks 6: Introduction to Wireless Data Networks 7: Wireless Standards and Technologies Part 3: Wireless Deployment Strategies 8: Implementing Wireless LANs: Security Considerations 9: Enabling Secure Wireless Access to Data 10: Real Examples from the Wireless World 11: The Wireless Future 12: Assessing Wireless Local Area Networks (LANs) Appendix A: Glossary of Wireless Terms
| Erscheint lt. Verlag | 16.5.2002 |
|---|---|
| Zusatzinfo | 1 |
| Sprache | englisch |
| Maße | 185 x 231 mm |
| Gewicht | 730 g |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Informatik ► Theorie / Studium ► Kryptologie | |
| Informatik ► Weitere Themen ► Hardware | |
| ISBN-13 | 9780072222869 / 9780072222869 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich