Cantitate/Preț
Produs

How to Cheat at Securing a Wireless Network: How to Cheat

Autor Chris Hurley, Lee Barken
en Limba Engleză Paperback – 21 aug 2006
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless network

With the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006.

With this increase in usage comes a commensurate increase in the network’s vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users.

· A practical product and technology specific guideline to securing a wireless networks for the busy System Administrator
· Takes a simplified multi-layered approach into easily deployed plans for a straight forward understanding
· Does not bog you down with history, but offers practical useful information for today
Citește tot Restrânge

Din seria How to Cheat

Preț: 29344 lei

Preț vechi: 36681 lei
-20% Nou

Puncte Express: 440

Preț estimativ în valută:
5616 5855$ 4667£

Carte tipărită la comandă

Livrare economică 21 martie-04 aprilie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9781597490870
ISBN-10: 1597490873
Pagini: 480
Dimensiuni: 178 x 229 x 33 mm
Greutate: 0.66 kg
Editura: ELSEVIER SCIENCE
Seria How to Cheat


Public țintă

Network administrator and Security administrators who need to secure wireless networks.

Cuprins

1: Introduction to Wireless: From Past to Present
2: Wireless Security
3: Dangers of Wireless Devices in the Workplace
4: WLAN Rogue Access Point Detection and Mitigation
5: Wireless LAN VLANs
6: Wireless Network Architecture and Design
7: Wireless Network Architecture and Design
8: Monitoring and Intrusion Detection
9: Case Study: Designing a Wireless Enterprise Network
10: Case Study: Designing a Wireless Industrial Network
11: Designing a Personal Wireless Network: Home Office Case Study
12: Wireless Penetration Testing
13:Appendix A: Solutions Fast Track