Get full details on major mobile/wireless clients and operating systems--including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security -- the most trusted name in e-security -- this is your one-stop guide to wireless security.
Get full details on major mobile/wireless clients and operating systems--including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security -- the most trusted name in e-security -- this is your one-stop guide to wireless security.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Merritt Maxim (Bedford, MA) has more than 4 years of experience in the information security industry, most recently as a product manager for wireless security at RSA Security, Inc.
Inhaltsangabe
Part 1: Introduction to Wireless 1: Welcome to a Wireless World 2: Wireless Threats 3: Introduction to Wireless Security Protocols and Cryptography 4: Security Considerations for Wireless Devices Part 2: Wireless Technologies and Applications 5: Introduction to Cellular Networks 6: Introduction to Wireless Data Networks 7: Wireless Standards and Technologies Part 3: Wireless Deployment Strategies 8: Implementing Wireless LANs: Security Considerations 9: Enabling Secure Wireless Access to Data 10: Real Examples from the Wireless World 11: The Wireless Future 12: Assessing Wireless Local Area Networks (LANs) Appendix A: Glossary of Wireless Terms
Part 1: Introduction to Wireless 1: Welcome to a Wireless World 2: Wireless Threats 3: Introduction to Wireless Security Protocols and Cryptography 4: Security Considerations for Wireless Devices Part 2: Wireless Technologies and Applications 5: Introduction to Cellular Networks 6: Introduction to Wireless Data Networks 7: Wireless Standards and Technologies Part 3: Wireless Deployment Strategies 8: Implementing Wireless LANs: Security Considerations 9: Enabling Secure Wireless Access to Data 10: Real Examples from the Wireless World 11: The Wireless Future 12: Assessing Wireless Local Area Networks (LANs) Appendix A: Glossary of Wireless Terms
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/neu