|
|
|
|
LEADER |
03084nmm a2200481 u 4500 |
001 |
EB001924506 |
003 |
EBX01000000000000001087408 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 9781281078339
|
020 |
|
|
|a 1281078336
|
020 |
|
|
|a 1429416599
|
020 |
|
|
|a 9781429416597
|
020 |
|
|
|a 0080508227
|
020 |
|
|
|a 1597490873
|
020 |
|
|
|a 9786611078331
|
020 |
|
|
|a 9780080508221
|
020 |
|
|
|a 9781597490870
|
050 |
|
4 |
|a TK5105.78
|
100 |
1 |
|
|a Hurley, Chris
|
245 |
0 |
0 |
|a How to cheat at securing a wireless network
|c Chris Hurley [and others]
|
260 |
|
|
|a Rockland, Mass.
|b Syngress
|c 2006
|
300 |
|
|
|a xxv, 453 pages
|b illustrations
|
505 |
0 |
|
|a Introduction to wireless : from past to present -- Wireless security -- Dangers of wireless devices in the workplace -- WLAN rogue access point detection and mitigation -- Wireless LAN VLANs -- Designing a wireless network -- Wireless network architecture and design -- Monitoring and intrusion detection -- Designing a wireless enterprise network : hospital case study -- Designing a wireless industrial network : retail case study -- Designing a wireless home network : home office case study -- Wireless penetration testing
|
653 |
|
|
|a COMPUTERS / Internet / Security / bisacsh
|
653 |
|
|
|a COMPUTERS / Networking / Security / bisacsh
|
653 |
|
|
|a Réseaux locaux sans fil / Sécurité / Mesures
|
653 |
|
|
|a Wireless LANs / Security measures / fast
|
653 |
|
|
|a Wireless LANs / Security measures
|
653 |
|
|
|a COMPUTERS / Security / General / bisacsh
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
490 |
0 |
|
|a How to Cheat Ser
|
500 |
|
|
|a Includes index
|
776 |
|
|
|z 0080508227
|
776 |
|
|
|z 9781429416597
|
776 |
|
|
|z 1429416599
|
776 |
|
|
|z 9780080508221
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781597490870/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 331
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless network With the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the networks vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users. A practical product and technology specific guideline to securing a wireless networks for the busy System Administrator Takes a simplified multi-layered approach into easily deployed plans for a straight forward understanding Does not bog you down with history, but offers practical useful information for today
|