Wireless Security

Wireless Security
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.
 PDF
Nicht lieferbar | Lieferzeit: Nicht lieferbar

91,32 €* PDF

Artikel-Nr:
9781439896266
Veröffentl:
2016
Einband:
PDF
Seiten:
230
Autor:
Wolfgang Osterhage
eBook Typ:
PDF
eBook Format:
PDF
Kopierschutz:
Adobe DRM [Hard-DRM]
Sprache:
Englisch
Beschreibung:

In the wake of the growing use of wireless communications, new types of security risks have evolved. Wireless Security covers the major topic of wireless communications with relevance both to organizations and private users. The technological background of these applications and protocols is laid out and presented in detail. Special emphasis is placed on the IEEE 802.11x-Standards that have been introduced for WLAN technology. Other technologies covered besides WLAN include: mobile phones, bluetooth and infrared. In each chapter a major part is devoted to security risks and provisions including encryption and authentication philosophies. Elaborate checklists have been provided to help IT administrators and security officers to achieve the maximum possible security in their installations, when using wireless technology. The book offers all necessary background information to this complex technological subject. It is at the same time a guideline and a working tool to implement a security strategy in organizations, assists in documenting the actual security status of existing installations, helps to avoid pitfalls, when operating in a wireless environment, and in configuring the necessary components.
In the wake of the growing use of wireless communications, new types of security risks have evolved. Wireless Security covers the major topic of wireless communications with relevance both to organizations and private users. The technological background of these applications and protocols is laid out and presented in detail. Special emphasis is placed on the IEEE 802.11x-Standards that have been introduced for WLAN technology. Other technologies covered besides WLAN include: mobile phones, bluetooth and infrared. In each chapter a major part is devoted to security risks and provisions including encryption and authentication philosophies. Elaborate checklists have been provided to help IT administrators and security officers to achieve the maximum possible security in their installations, when using wireless technology. The book offers all necessary background information to this complex technological subject. It is at the same time a guideline and a working tool to implement a security strategy in organizations, assists in documenting the actual security status of existing installations, helps to avoid pitfalls, when operating in a wireless environment, and in configuring the necessary components.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.