Wireless Security End-to-end

Author:   Brian Carter ,  Russell Shumway
Publisher:   John Wiley & Sons Inc
ISBN:  

9780764548864


Pages:   360
Publication Date:   22 August 2002
Format:   Paperback
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Our Price $105.60 Quantity:  
Add to Cart

Share |

Wireless Security End-to-end


Add your own review!

Overview

This work is a comprehensive guide covering encryption, PKI, SSL, third party certificate validation, Smart card, pin authentication, device level security, threat analysis, strategies for developing a wireless security solution and a look ahead at future biometric technology.

Full Product Details

Author:   Brian Carter ,  Russell Shumway
Publisher:   John Wiley & Sons Inc
Imprint:   Hungry Minds Inc,U.S.
Dimensions:   Width: 18.90cm , Height: 2.00cm , Length: 23.30cm
Weight:   0.493kg
ISBN:  

9780764548864


ISBN 10:   0764548867
Pages:   360
Publication Date:   22 August 2002
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Unknown
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Table of Contents

Preface. Part I: Introduction to Wireless Network Security. Chapter 1: Introduction to Wireless Networking. Chapter 2: Wireless Threat Analysis. Chapter 3: Behind the Threat. Part II: Network Security Components. Chapter 4: The Network Security Model. Chapter 5: Network Intrusion Protection. Chapter 6: Network Intrusion Detection. Chapter 7: Host--Based Security. Chapter 8: Virtual Private Networking. Chapter 9: Event Correlation. Part III: Wireless Security Components. Chapter 10: Secure Configuration. Chapter 11: Secure Authentication. Chapter 12: Encryption. Chapter 13: Wireless Device Placement. Part IV: Integrating Wireless Access into the Network Security Process. Chapter 14: Logging Wireless Events. Chapter 15: Policy Issues. Chapter 16: Assessing Wireless Network Security. Chapter 17: Change Control and Device Administration. Part V: Wireless Security Models. Chapter 18: Cisco Implementation with LEAP. Chapter 19: WLAN Authentication and Key Management with RADIUS. Chapter 20: Wireless Access with IPSEC. Chapter 21: Secure Wireless Public Access. Chapter 22: Secure Wireless Point--to--Point Connectivity. Appendix A: Glossary of Terms. Appendix B: Web Site References. Index.

Reviews

"""...this book has convinced me..."" (Communications News, February 2003)"


...this book has convinced me... (Communications News, February 2003)


Author Information

BRIAN CARTER, CISSP, CSSA--1, is a former intelligence analyst for both the military and law enforcement who currently works as an Information Protection Analyst for NatCity Investments, handling firewalls, intrusion detection systems, cryptography, and security architecture. RUSSELL SHUMWAY, CISSP, is a Principal Consultant at Guardent. He was previously the Technical Director of Global Integrity Corporation's REACT program, where he provided incident response services for clients worldwide. Russell is the coauthor of Incident Response.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List