語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Wireless operational security[electr...
~
Ransome, James F.
Wireless operational security[electronic resource] /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
杜威分類號:
005.8
書名/作者:
Wireless operational security/ John W. Rittinghouse, James F. Ransome.
作者:
Rittinghouse, John W.
其他作者:
Ransome, James F.
出版者:
Burlington, MA : : Digital Press,, c2004.
面頁冊數:
xxvi, 468 p. : : ill. ;; 24 cm.
附註:
Includes index.
標題:
Computer security.
標題:
Computer networks - Security measures.
ISBN:
9781555583170
ISBN:
1555583172
摘要、提要註:
This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired network and the wireless subnet is not separated from the wired subnet. There are approximately a dozen popular books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for wireless security, none of which address them in a practical, operationally-oriented and comprehensive way. Wireless Operational Security bridges this gap. *Presents a new "WISDOM" model for Wireless Security Infrastructures *Acts as a critical guide to implementing "Converged Networks" wired/wireless with all necessary security considerations *Rittinghouse's Cybersecurity Operations Handbook is the only security book recommended by the FCC.
電子資源:
An electronic book accessible through the World Wide Web; click for information
電子資源:
An electronic book accessible through the World Wide Web; click for information
Wireless operational security[electronic resource] /
Rittinghouse, John W.
Wireless operational security
[electronic resource] /John W. Rittinghouse, James F. Ransome. - Burlington, MA :Digital Press,c2004. - xxvi, 468 p. :ill. ;24 cm.
Includes index.
This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired network and the wireless subnet is not separated from the wired subnet. There are approximately a dozen popular books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for wireless security, none of which address them in a practical, operationally-oriented and comprehensive way. Wireless Operational Security bridges this gap. *Presents a new "WISDOM" model for Wireless Security Infrastructures *Acts as a critical guide to implementing "Converged Networks" wired/wireless with all necessary security considerations *Rittinghouse's Cybersecurity Operations Handbook is the only security book recommended by the FCC.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 9781555583170
Source: 104110:104131Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
338952
Computer security.
Index Terms--Genre/Form:
336502
Electronic books.
LC Class. No.: QA76.9.A25 / R588 2004eb
Dewey Class. No.: 005.8
Wireless operational security[electronic resource] /
LDR
:02796cam 2200325Ia 4500
001
338304
003
OCoLC
005
20100729101520.0
006
m d
007
cr cn|||||||||
008
110620s2004 maua o 001 0 eng d
020
$a
9781555583170
020
$a
1555583172
029
1
$a
NZ1
$b
12435504
035
$a
(OCoLC)162595218
035
$a
ocn162595218
037
$a
104110:104131
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$c
OPELS
$d
OCLCQ
049
$a
TEFA
050
1 4
$a
QA76.9.A25
$b
R588 2004eb
082
0 4
$a
005.8
$2
22
100
1
$a
Rittinghouse, John W.
$3
405773
245
1 0
$a
Wireless operational security
$h
[electronic resource] /
$c
John W. Rittinghouse, James F. Ransome.
260
$a
Burlington, MA :
$b
Digital Press,
$c
c2004.
300
$a
xxvi, 468 p. :
$b
ill. ;
$c
24 cm.
500
$a
Includes index.
520
$a
This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired network and the wireless subnet is not separated from the wired subnet. There are approximately a dozen popular books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for wireless security, none of which address them in a practical, operationally-oriented and comprehensive way. Wireless Operational Security bridges this gap. *Presents a new "WISDOM" model for Wireless Security Infrastructures *Acts as a critical guide to implementing "Converged Networks" wired/wireless with all necessary security considerations *Rittinghouse's Cybersecurity Operations Handbook is the only security book recommended by the FCC.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on Aug. 2, 2007).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Computer security.
$3
338952
650
0
$a
Computer networks
$x
Security measures.
$3
341462
655
7
$a
Electronic books.
$2
local
$3
336502
700
1
$a
Ransome, James F.
$3
405774
710
2
$a
ScienceDirect (Online service)
$3
365609
776
1
$c
Original
$z
1555583172
$z
9781555583170
$w
(OCoLC)54831240
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781555583170
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781555583170
$z
An electronic book accessible through the World Wide Web; click for information
994
$a
C0
$b
TEF
筆 0 讀者評論
多媒體
多媒體檔案
http://www.sciencedirect.com/science/book/9781555583170
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781555583170
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入