Wireless Security End-to-end
Hungry Minds Inc,U.S. (Verlag)
978-0-7645-4886-4 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
"Wireless Security End to End" is a comprehensive guide covering encryption, PKI, SSL, third party certificate validation, Smart card, pin authentication, device level security, threat analysis, strategies for developing a wireless security solution and a look ahead at future biometric technology all in the "End to End" series targeted at real-world professionals. "Wireless Security End to End" is being done in the "End to End" series, a new series dedicated to cutting-edge technologies designed to provide proven solutions, real-world tips and best practices. The "End to End" series takes a no "techno-babble" modular approach in explaining cutting edge wireless technology. Special features include case studies, real-life implementations and wireless decision tree.
BRIAN CARTER, CISSP, CSSA--1, is a former intelligence analyst for both the military and law enforcement who currently works as an Information Protection Analyst for NatCity Investments, handling firewalls, intrusion detection systems, cryptography, and security architecture. RUSSELL SHUMWAY, CISSP, is a Principal Consultant at Guardent. He was previously the Technical Director of Global Integrity Corporation's REACT program, where he provided incident response services for clients worldwide. Russell is the coauthor of Incident Response.
Preface. Part I: Introduction to Wireless Network Security. Chapter 1: Introduction to Wireless Networking. Chapter 2: Wireless Threat Analysis. Chapter 3: Behind the Threat. Part II: Network Security Components. Chapter 4: The Network Security Model. Chapter 5: Network Intrusion Protection. Chapter 6: Network Intrusion Detection. Chapter 7: Host--Based Security. Chapter 8: Virtual Private Networking. Chapter 9: Event Correlation. Part III: Wireless Security Components. Chapter 10: Secure Configuration. Chapter 11: Secure Authentication. Chapter 12: Encryption. Chapter 13: Wireless Device Placement. Part IV: Integrating Wireless Access into the Network Security Process. Chapter 14: Logging Wireless Events. Chapter 15: Policy Issues. Chapter 16: Assessing Wireless Network Security. Chapter 17: Change Control and Device Administration. Part V: Wireless Security Models. Chapter 18: Cisco Implementation with LEAP. Chapter 19: WLAN Authentication and Key Management with RADIUS. Chapter 20: Wireless Access with IPSEC. Chapter 21: Secure Wireless Public Access. Chapter 22: Secure Wireless Point--to--Point Connectivity. Appendix A: Glossary of Terms. Appendix B: Web Site References. Index.
Erscheint lt. Verlag | 9.9.2002 |
---|---|
Reihe/Serie | End to end |
Zusatzinfo | Ill. |
Sprache | englisch |
Maße | 189 x 233 mm |
Gewicht | 493 g |
Einbandart | Paperback |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-7645-4886-7 / 0764548867 |
ISBN-13 | 978-0-7645-4886-4 / 9780764548864 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich