Wireless operational security

This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even m...

Πλήρης περιγραφή

Κύριος συγγραφέας: Rittinghouse, John W.
Άλλοι συγγραφείς: Ransome, James F.
Μορφή: Ηλεκτρονική πηγή
Γλώσσα: English
Στοιχεία έκδοσης: Burlington, MA : Elsevier/Digital Press, c2004.
Θέματα:
Διαθέσιμο Online: http://www.sciencedirect.com/science/book/9781555583170
Ετικέτες: Προσθήκη ετικέτας
Δεν υπάρχουν, Καταχωρήστε ετικέτα πρώτοι!
LEADER 02292nam a2200337 a 4500
001 1/45434
008 140828s2004 us 001 0 eng
020 |a 9780080521190 (electronic bk.) 
020 |a 0080521193 (electronic bk.) 
020 |a 9781555583170 
020 |a 1555583172 
035 |l 48394 
040 |a N$T  |b eng  |c N$T  |d OCLCQ  |d YDXCP  |d OCLCQ  |d MERUC  |d OCLCQ  |d NTG  |d OCLCE  |d B24X7  |d OCLCF  |d OPELS  |d GR-PeUP 
100 1 |a Rittinghouse, John W. 
245 1 0 |a Wireless operational security  |h [electronic resource] /  |c John W. Rittinghouse, James F. Ransome. 
260 |a Burlington, MA :  |b Elsevier/Digital Press,  |c c2004. 
300 |a 1 online resource (xxvi, 468 p.) :  |b ill. 
500 |a Includes index. 
505 0 |a Front Cover; Wireless Operational Security; Copyright Page; Contents; List of Figures and Tables; Foreword; Preface; Acknowledgments; Section I: General Network Security; Section II: Wireless Network Security; Glossary; A Wireless Policy Essentials; B Wireless-related Legislative Links; C Additional WLAN References; Index; 
520 |a This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired netwo. 
504 |a Includes bibliographical references and index. 
650 4 |a Computer security. 
650 4 |a Computer networks  |x Security measures. 
655 4 |a Electronic books. 
700 1 |a Ransome, James F. 
852 |a INST  |b UNIPILB  |c EBOOKS  |e 20140828  |p 00b48394  |q 00b48394  |t ONLINE  |y 0 
856 4 0 |3 ScienceDirect  |u http://www.sciencedirect.com/science/book/9781555583170 
856 4 |d /webopac/covers/03/48394_9780080521190.jpg  |z (electronic bk.) 
856 4 |d /webopac/covers/03/48394_0080521193.jpg  |z (electronic bk.) 
856 4 |d /webopac/covers/03/48394_9781555583170.jpg 
856 4 |d /webopac/covers/03/48394_1555583172.jpg