Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Wireless Security End-to-end - Brian Carter, Russell Shumway

Wireless Security End-to-end

Buch | Softcover
360 Seiten
2002
Hungry Minds Inc,U.S. (Verlag)
978-0-7645-4886-4 (ISBN)
CHF 54,50 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Part of the "End to End" series, this title serves as a guide that covers encryption, PKI, SSL, third party certificate validation, Smart card, pin authentication, device level security, threat analysis, strategies for developing a wireless security solution. It is intended for professionals.
"Wireless Security End to End" is a comprehensive guide covering encryption, PKI, SSL, third party certificate validation, Smart card, pin authentication, device level security, threat analysis, strategies for developing a wireless security solution and a look ahead at future biometric technology all in the "End to End" series targeted at real-world professionals. "Wireless Security End to End" is being done in the "End to End" series, a new series dedicated to cutting-edge technologies designed to provide proven solutions, real-world tips and best practices. The "End to End" series takes a no "techno-babble" modular approach in explaining cutting edge wireless technology. Special features include case studies, real-life implementations and wireless decision tree.

BRIAN CARTER, CISSP, CSSA--1, is a former intelligence analyst for both the military and law enforcement who currently works as an Information Protection Analyst for NatCity Investments, handling firewalls, intrusion detection systems, cryptography, and security architecture. RUSSELL SHUMWAY, CISSP, is a Principal Consultant at Guardent. He was previously the Technical Director of Global Integrity Corporation's REACT program, where he provided incident response services for clients worldwide. Russell is the coauthor of Incident Response.

Preface. Part I: Introduction to Wireless Network Security. Chapter 1: Introduction to Wireless Networking. Chapter 2: Wireless Threat Analysis. Chapter 3: Behind the Threat. Part II: Network Security Components. Chapter 4: The Network Security Model. Chapter 5: Network Intrusion Protection. Chapter 6: Network Intrusion Detection. Chapter 7: Host--Based Security. Chapter 8: Virtual Private Networking. Chapter 9: Event Correlation. Part III: Wireless Security Components. Chapter 10: Secure Configuration. Chapter 11: Secure Authentication. Chapter 12: Encryption. Chapter 13: Wireless Device Placement. Part IV: Integrating Wireless Access into the Network Security Process. Chapter 14: Logging Wireless Events. Chapter 15: Policy Issues. Chapter 16: Assessing Wireless Network Security. Chapter 17: Change Control and Device Administration. Part V: Wireless Security Models. Chapter 18: Cisco Implementation with LEAP. Chapter 19: WLAN Authentication and Key Management with RADIUS. Chapter 20: Wireless Access with IPSEC. Chapter 21: Secure Wireless Public Access. Chapter 22: Secure Wireless Point--to--Point Connectivity. Appendix A: Glossary of Terms. Appendix B: Web Site References. Index.

Erscheint lt. Verlag 9.9.2002
Reihe/Serie End to end
Zusatzinfo Ill.
Sprache englisch
Maße 189 x 233 mm
Gewicht 493 g
Einbandart Paperback
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 0-7645-4886-7 / 0764548867
ISBN-13 978-0-7645-4886-4 / 9780764548864
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 48,95
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
CHF 39,20