Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Wireless operational security
~
Ransome, James F.
Linked to FindBook
Google Book
Amazon
博客來
Wireless operational security
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Wireless operational security/ John W. Rittinghouse, James F. Ransome.
Author:
Rittinghouse, John W.
other author:
Ransome, James F.
Published:
Burlington, MA :Digital Press, : c2004.,
Description:
xxvi, 468 p. :ill. ;24 cm.
Notes:
Includes index.
Subject:
Computer networks - Security measures. -
Online resource:
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781555583170An electronic book accessible through the World Wide Web; click for information
Online resource:
http://www.sciencedirect.com/science/book/9781555583170An electronic book accessible through the World Wide Web; click for information
ISBN:
1555583172
Wireless operational security
Rittinghouse, John W.
Wireless operational security
[electronic resource] /John W. Rittinghouse, James F. Ransome. - Burlington, MA :Digital Press,c2004. - xxvi, 468 p. :ill. ;24 cm.
Includes index.
This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired network and the wireless subnet is not separated from the wired subnet. There are approximately a dozen popular books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for wireless security, none of which address them in a practical, operationally-oriented and comprehensive way. Wireless Operational Security bridges this gap. *Presents a new "WISDOM" model for Wireless Security Infrastructures *Acts as a critical guide to implementing "Converged Networks" wired/wireless with all necessary security considerations *Rittinghouse's Cybersecurity Operations Handbook is the only security book recommended by the FCC.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 1555583172
Source: 104110:104131Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
579161
Computer networks
--Security measures.Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: QA76.9.A25 / R588 2004eb
Dewey Class. No.: 005.8
Wireless operational security
LDR
:02711cam 2200313 a 45
001
893488
003
OCoLC
005
20101126
006
m d
007
cr cn|||||||||
008
101126s2004 maua o 001 0 eng d
020
$a
1555583172
020
$a
9781555583170
029
1
$a
NZ1
$b
12435504
035
$a
(OCoLC)162595218
035
$a
ocn162595218
037
$a
104110:104131
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$c
OPELS
$d
OCLCQ
049
$a
TEFA
050
1 4
$a
QA76.9.A25
$b
R588 2004eb
082
0 4
$a
005.8
$2
22
100
1
$a
Rittinghouse, John W.
$3
767835
245
1 0
$a
Wireless operational security
$h
[electronic resource] /
$c
John W. Rittinghouse, James F. Ransome.
260
$a
Burlington, MA :
$c
c2004.
$b
Digital Press,
300
$a
xxvi, 468 p. :
$b
ill. ;
$c
24 cm.
500
$a
Includes index.
520
$a
This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired network and the wireless subnet is not separated from the wired subnet. There are approximately a dozen popular books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for wireless security, none of which address them in a practical, operationally-oriented and comprehensive way. Wireless Operational Security bridges this gap. *Presents a new "WISDOM" model for Wireless Security Infrastructures *Acts as a critical guide to implementing "Converged Networks" wired/wireless with all necessary security considerations *Rittinghouse's Cybersecurity Operations Handbook is the only security book recommended by the FCC.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on Aug. 2, 2007).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Computer security.
$3
540555
655
7
$a
Electronic books.
$2
lcsh
$3
542853
700
1
$a
Ransome, James F.
$3
767836
710
2
$a
ScienceDirect (Online service)
$3
848416
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781555583170
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781555583170
$z
An electronic book accessible through the World Wide Web; click for information
994
$a
C0
$b
TEF
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9085569
電子資源
11.線上閱覽_V
電子書
EB W9085569
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login