Wireless Security End to End
Brian Carter, Russell Shumway
- 出版商: Hungry Minds
- 出版日期: 2002-08-22
- 售價: $1,310
- 貴賓價: 9.5 折 $1,245
- 語言: 英文
- 頁數: 360
- 裝訂: Paperback
- ISBN: 0764548867
- ISBN-13: 9780764548864
-
相關分類:
資訊安全
下單後立即進貨 (約1~3週)
買這商品的人也買了...
-
$1,090$1,036 -
$1,630$1,549 -
$980$833 -
$1,470$1,397 -
$680$578 -
$690$587 -
$620$527 -
$580$458 -
$580$493 -
$720$612 -
$990$782 -
$1,100$1,045 -
$750$638 -
$560$476 -
$720$612 -
$750$638 -
$490$382 -
$299$254 -
$450$383 -
$780$663 -
$650$507 -
$680$578 -
$980$833 -
$680$578 -
$720$612
相關主題
商品描述
Wireless Security End to End is a comprehensive guide covering encryption,
PKI, SSL, third party certificate validation, Smart card, pin authentication,
device level security, threat analysis, strategies for developing a wireless
security solution and a look ahead at future biometric technology all in the End
to End series targeted at real-world professionals.
Wireless Security End to
End is being done in the End to End series, a new series dedicated to
cutting-edge technologies designed to provide proven solutions, real-world tips
and best practices. The End to End series takes a no "techno-babble" modular
approach in explaining cutting edge wireless technology. Special features
include case studies, real-life implementations and wireless decision tree.
Table of Contents
Preface.
Part I: Introduction to Wireless Network Security.
Chapter 1: Introduction to Wireless Networking.
Chapter 2: Wireless Threat Analysis.
Chapter 3: Behind the Threat.
Part II: Network Security Components.
Chapter 4: The Network Security Model.
Chapter 5: Network Intrusion Protection.
Chapter 6: Network Intrusion Detection.
Chapter 7: Host-Based Security.
Chapter 8: Virtual Private Networking.
Chapter 9: Event Correlation.
Part III: Wireless Security Components.
Chapter 10: Secure Configuration.
Chapter 11: Secure Authentication.
Chapter 12: Encryption.
Chapter 13: Wireless Device Placement.
Part IV: Integrating Wireless Access into the Network Security Process.
Chapter 14: Logging Wireless Events.
Chapter 15: Policy Issues.
Chapter 16: Assessing Wireless Network Security.
Chapter 17: Change Control and Device Administration.
Part V: Wireless Security Models.
Chapter 18: Cisco Implementation with LEAP.
Chapter 19: WLAN Authentication and Key Management with RADIUS.
Chapter 20: Wireless Access with IPSEC.
Chapter 21: Secure Wireless Public Access.
Chapter 22: Secure Wireless Point-to-Point Connectivity.
Appendix A: Glossary of Terms.
Appendix B: Web Site References.
Index.