Wireless operational security
This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even m...
Κύριος συγγραφέας: | Rittinghouse, John W. |
---|---|
Άλλοι συγγραφείς: | Ransome, James F. |
Μορφή: | Ηλεκτρονική πηγή |
Γλώσσα: | English |
Στοιχεία έκδοσης: |
Burlington, MA :
Elsevier/Digital Press,
c2004.
|
Θέματα: | |
Διαθέσιμο Online: |
http://www.sciencedirect.com/science/book/9781555583170 |
Ετικέτες: |
Προσθήκη ετικέτας
Δεν υπάρχουν, Καταχωρήστε ετικέτα πρώτοι!
|
LEADER | 02292nam a2200337 a 4500 | ||
---|---|---|---|
001 | 1/45434 | ||
008 | 140828s2004 us 001 0 eng | ||
020 | |a 9780080521190 (electronic bk.) | ||
020 | |a 0080521193 (electronic bk.) | ||
020 | |a 9781555583170 | ||
020 | |a 1555583172 | ||
035 | |l 48394 | ||
040 | |a N$T |b eng |c N$T |d OCLCQ |d YDXCP |d OCLCQ |d MERUC |d OCLCQ |d NTG |d OCLCE |d B24X7 |d OCLCF |d OPELS |d GR-PeUP | ||
100 | 1 | |a Rittinghouse, John W. | |
245 | 1 | 0 | |a Wireless operational security |h [electronic resource] / |c John W. Rittinghouse, James F. Ransome. |
260 | |a Burlington, MA : |b Elsevier/Digital Press, |c c2004. | ||
300 | |a 1 online resource (xxvi, 468 p.) : |b ill. | ||
500 | |a Includes index. | ||
505 | 0 | |a Front Cover; Wireless Operational Security; Copyright Page; Contents; List of Figures and Tables; Foreword; Preface; Acknowledgments; Section I: General Network Security; Section II: Wireless Network Security; Glossary; A Wireless Policy Essentials; B Wireless-related Legislative Links; C Additional WLAN References; Index; | |
520 | |a This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired netwo. | ||
504 | |a Includes bibliographical references and index. | ||
650 | 4 | |a Computer security. | |
650 | 4 | |a Computer networks |x Security measures. | |
655 | 4 | |a Electronic books. | |
700 | 1 | |a Ransome, James F. | |
852 | |a INST |b UNIPILB |c EBOOKS |e 20140828 |p 00b48394 |q 00b48394 |t ONLINE |y 0 | ||
856 | 4 | 0 | |3 ScienceDirect |u http://www.sciencedirect.com/science/book/9781555583170 |
856 | 4 | |d /webopac/covers/03/48394_9780080521190.jpg |z (electronic bk.) | |
856 | 4 | |d /webopac/covers/03/48394_0080521193.jpg |z (electronic bk.) | |
856 | 4 | |d /webopac/covers/03/48394_9781555583170.jpg | |
856 | 4 | |d /webopac/covers/03/48394_1555583172.jpg |