語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
How to cheat at securing a wireless network
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
How to cheat at securing a wireless network/ Chris Hurley, Lee Barken.
作者:
Hurley, Chris.
其他作者:
Barken, Lee.
出版者:
Rockland, Mass. :Syngress ; : 2006.,
面頁冊數:
xxv, 453 p. :ill. ; : 23 cm.;
標題:
Wireless LANs - Security measures. -
電子資源:
An electronic book accessible through the World Wide Web; click for information
電子資源:
An electronic book accessible through the World Wide Web; click for information
ISBN:
9780080508221 (electronic bk.)
How to cheat at securing a wireless network
Hurley, Chris.
How to cheat at securing a wireless network
[electronic resource] /Chris Hurley, Lee Barken. - Rockland, Mass. :Syngress ;2006. - xxv, 453 p. :ill. ;23 cm.
Introduction to wireless : from past to present -- Wireless security -- Dangers of wireless devices in the workplace -- WLAN rogue access point detection and mitigation -- Wireless LAN VLANs -- Designing a wireless network -- Wireless network architecture and design -- Monitoring and intrusion detection -- Designing a wireless enterprise network : hospital case study -- Designing a wireless industrial network : retail case study -- Designing a wireless home network : home office case study -- Wireless penetration testing.
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless network With the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the networks vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users. A practical product and technology specific guideline to securing a wireless networks for the busy System Administrator Takes a simplified multi-layered approach into easily deployed plans for a straight forward understanding Does not bog you down with history, but offers practical useful information for today.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 9780080508221 (electronic bk.)Subjects--Topical Terms:
568167
Wireless LANs
--Security measures.Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: TK5103.2 / .H68 2006eb
Dewey Class. No.: 005.8
How to cheat at securing a wireless network
LDR
:03015cam a22002894a 4500
001
613825
003
OCoLC
005
20091026094528.0
006
m d
007
cr cn
008
091218s2006 maua s 000 0 eng d
020
$a
9780080508221 (electronic bk.)
020
$a
0080508227 (electronic bk.)
020
$a
9781597490870 (paper)
020
$a
1597490873 (paper)
035
$a
(OCoLC)162597510
035
$a
ocn162597510
040
$a
OPELS
$c
OPELS
$d
OKU
050
1 4
$a
TK5103.2
$b
.H68 2006eb
082
0 4
$a
005.8
$2
22
100
1
$a
Hurley, Chris.
$3
568168
245
1 0
$a
How to cheat at securing a wireless network
$h
[electronic resource] /
$c
Chris Hurley, Lee Barken.
260
$a
Rockland, Mass. :
$a
Oxford :
$c
2006.
$b
Syngress ;
$b
Elsevier Science [distributor],
300
$a
xxv, 453 p. :
$b
ill. ;
$c
23 cm.
505
0
$a
Introduction to wireless : from past to present -- Wireless security -- Dangers of wireless devices in the workplace -- WLAN rogue access point detection and mitigation -- Wireless LAN VLANs -- Designing a wireless network -- Wireless network architecture and design -- Monitoring and intrusion detection -- Designing a wireless enterprise network : hospital case study -- Designing a wireless industrial network : retail case study -- Designing a wireless home network : home office case study -- Wireless penetration testing.
520
$a
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless network With the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the networks vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users. A practical product and technology specific guideline to securing a wireless networks for the busy System Administrator Takes a simplified multi-layered approach into easily deployed plans for a straight forward understanding Does not bog you down with history, but offers practical useful information for today.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on Aug. 2, 2007).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Wireless LANs
$x
Security measures.
$3
568167
655
7
$a
Electronic books.
$2
local
$3
554714
700
1
$a
Barken, Lee.
$3
641881
710
2
$a
ScienceDirect (Online service)
$3
636041
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597490870
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597490870
$z
An electronic book accessible through the World Wide Web; click for information
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入