How to Cheat at Securing a Wireless Network: How to Cheat
Autor Chris Hurley, Lee Barkenen Limba Engleză Paperback – 21 aug 2006
With the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006.
With this increase in usage comes a commensurate increase in the network’s vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users.
· A practical product and technology specific guideline to securing a wireless networks for the busy System Administrator
· Takes a simplified multi-layered approach into easily deployed plans for a straight forward understanding
· Does not bog you down with history, but offers practical useful information for today
Din seria How to Cheat
- 21% Preț: 220.02 lei
- 20% Preț: 384.25 lei
- 20% Preț: 374.19 lei
- 20% Preț: 364.58 lei
- 20% Preț: 363.83 lei
- 20% Preț: 330.56 lei
- 20% Preț: 295.91 lei
- 20% Preț: 377.17 lei
- 20% Preț: 381.93 lei
- 20% Preț: 320.67 lei
- 20% Preț: 277.36 lei
- 20% Preț: 377.17 lei
- 20% Preț: 312.75 lei
- 20% Preț: 306.13 lei
- 20% Preț: 314.06 lei
- 20% Preț: 358.89 lei
- 20% Preț: 380.29 lei
- 16% Preț: 185.37 lei
Preț: 293.44 lei
Preț vechi: 366.81 lei
-20% Nou
Puncte Express: 440
Preț estimativ în valută:
56.16€ • 58.55$ • 46.67£
56.16€ • 58.55$ • 46.67£
Carte tipărită la comandă
Livrare economică 21 martie-04 aprilie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781597490870
ISBN-10: 1597490873
Pagini: 480
Dimensiuni: 178 x 229 x 33 mm
Greutate: 0.66 kg
Editura: ELSEVIER SCIENCE
Seria How to Cheat
ISBN-10: 1597490873
Pagini: 480
Dimensiuni: 178 x 229 x 33 mm
Greutate: 0.66 kg
Editura: ELSEVIER SCIENCE
Seria How to Cheat
Public țintă
Network administrator and Security administrators who need to secure wireless networks.Cuprins
1: Introduction to Wireless: From Past to Present
2: Wireless Security
3: Dangers of Wireless Devices in the Workplace
4: WLAN Rogue Access Point Detection and Mitigation
5: Wireless LAN VLANs
6: Wireless Network Architecture and Design
7: Wireless Network Architecture and Design
8: Monitoring and Intrusion Detection
9: Case Study: Designing a Wireless Enterprise Network
10: Case Study: Designing a Wireless Industrial Network
11: Designing a Personal Wireless Network: Home Office Case Study
12: Wireless Penetration Testing
13:Appendix A: Solutions Fast Track
2: Wireless Security
3: Dangers of Wireless Devices in the Workplace
4: WLAN Rogue Access Point Detection and Mitigation
5: Wireless LAN VLANs
6: Wireless Network Architecture and Design
7: Wireless Network Architecture and Design
8: Monitoring and Intrusion Detection
9: Case Study: Designing a Wireless Enterprise Network
10: Case Study: Designing a Wireless Industrial Network
11: Designing a Personal Wireless Network: Home Office Case Study
12: Wireless Penetration Testing
13:Appendix A: Solutions Fast Track