Cargando…

Wireless operational security /

This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even m...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Rittinghouse, John W.
Otros Autores: Ransome, James F.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, MA : Elsevier/Digital Press, ©2004.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn171038211
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 070912s2004 maua ob 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d OCLCQ  |d YDXCP  |d OCLCQ  |d MERUC  |d OCLCQ  |d NTG  |d OCLCE  |d B24X7  |d OCLCF  |d OPELS  |d UKDOC  |d OCLCQ  |d UBY  |d ZCU  |d E7B  |d IDEBK  |d NLGGC  |d OCLCQ  |d OCLCA  |d D6H  |d VTS  |d STF  |d K6U  |d LEAUB  |d OL$  |d EYM  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 62771201  |a 162595218  |a 441792182  |a 505064256  |a 507645338  |a 607139269  |a 646202419  |a 648244826  |a 1035686427  |a 1086508192  |a 1160105863  |a 1194734044 
020 |a 9780080521190  |q (electronic bk.) 
020 |a 0080521193  |q (electronic bk.) 
020 |a 9781555583170 
020 |a 1555583172 
029 1 |a AU@  |b 000051560300 
029 1 |a AU@  |b 000053223963 
029 1 |a CHBIS  |b 005831541 
029 1 |a CHNEW  |b 001007113 
029 1 |a CHVBK  |b 168363704 
029 1 |a DEBBG  |b BV042307737 
029 1 |a DEBBG  |b BV043044276 
029 1 |a DEBSZ  |b 405311907 
029 1 |a DEBSZ  |b 422198110 
029 1 |a NZ1  |b 12435504 
035 |a (OCoLC)171038211  |z (OCoLC)62771201  |z (OCoLC)162595218  |z (OCoLC)441792182  |z (OCoLC)505064256  |z (OCoLC)507645338  |z (OCoLC)607139269  |z (OCoLC)646202419  |z (OCoLC)648244826  |z (OCoLC)1035686427  |z (OCoLC)1086508192  |z (OCoLC)1160105863  |z (OCoLC)1194734044 
037 |a 104110:104131  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
042 |a dlr 
050 4 |a QA76.9.A25  |b R588 2004eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Rittinghouse, John W. 
245 1 0 |a Wireless operational security /  |c John W. Rittinghouse, James F. Ransome. 
260 |a Burlington, MA :  |b Elsevier/Digital Press,  |c ©2004. 
300 |a 1 online resource (xxvi, 468 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
505 0 |a Front Cover; Wireless Operational Security; Copyright Page; Contents; List of Figures and Tables; Foreword; Preface; Acknowledgments; Section I: General Network Security; Section II: Wireless Network Security; Glossary; A Wireless Policy Essentials; B Wireless-related Legislative Links; C Additional WLAN References; Index. 
520 |a This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired netwo. 
504 |a Includes bibliographical references and index. 
506 |3 Use copy  |f Restrictions unspecified  |2 star  |5 MiAaHDL 
533 |a Electronic reproduction.  |b [Place of publication not identified] :  |c HathiTrust Digital Library,  |d 2010.  |5 MiAaHDL 
538 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.  |u http://purl.oclc.org/DLF/benchrepro0212  |5 MiAaHDL 
583 1 |a digitized  |c 2010  |h HathiTrust Digital Library  |l committed to preserve  |2 pda  |5 MiAaHDL 
588 0 |a Print version record. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
700 1 |a Ransome, James F. 
776 0 8 |i Print version:  |a Rittinghouse, John W.  |t Wireless operational security.  |d Burlington, MA : Elsevier/Digital Press, ©2004  |z 1555583172  |z 9781555583170  |w (OCoLC)54831240 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=196566  |z Texto completo 
938 |a 123Library  |b 123L  |n 36570 
938 |a Books 24x7  |b B247  |n bks00004073 
938 |a ebrary  |b EBRY  |n ebr10175605 
938 |a EBSCOhost  |b EBSC  |n 196566 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 102262 
938 |a YBP Library Services  |b YANK  |n 2614095 
994 |a 92  |b IZTAP