|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocm59554975 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
050425s2005 inua fob 001 0 eng d |
010 |
|
|
|a 2003107991
|
040 |
|
|
|a OCL
|b eng
|e pn
|c OCL
|d OCLCQ
|d VLB
|d OCLCQ
|d CEF
|d MBB
|d OCLCQ
|d OCLCF
|d OCLCO
|d OCLCQ
|d AU@
|d WYU
|d RDF
|d LDP
|d HS0
|d VT2
|d INARC
|d OCLCO
|d OCLCQ
|
015 |
|
|
|a GBA467011
|2 bnb
|
016 |
7 |
|
|a 012991943
|2 Uk
|
016 |
7 |
|
|a 012991943.
|2 Uk
|
019 |
|
|
|a 692723149
|a 748094942
|a 1044593563
|a 1056380804
|a 1061039063
|a 1156927516
|a 1180316114
|a 1202543775
|a 1240508893
|a 1288400126
|
020 |
|
|
|z 1587051540
|q (hbk.)
|
020 |
|
|
|a 9781587051548
|
020 |
|
|
|a 1587051540
|
029 |
1 |
|
|a HEBIS
|b 291462634
|
035 |
|
|
|a (OCoLC)59554975
|z (OCoLC)692723149
|z (OCoLC)748094942
|z (OCoLC)1044593563
|z (OCoLC)1056380804
|z (OCoLC)1061039063
|z (OCoLC)1156927516
|z (OCoLC)1180316114
|z (OCoLC)1202543775
|z (OCoLC)1240508893
|z (OCoLC)1288400126
|
050 |
|
4 |
|a TK5105.59
|b .C57 2005
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Cisco wireless LAN security /
|c Krishna Sankar [and others].
|
260 |
|
|
|a Indianapolis, IN :
|b Cisco,
|c ©2005.
|
300 |
|
|
|a 1 online resource (xxiii, 419 pages) :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Networking technology series
|
504 |
|
|
|a Includes bibliographical references (pages 399-402) and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
0 |
|g Ch. 1.
|t Securing WLANs overview --
|g Ch. 2.
|t Basic security mechanics and mechanisms --
|g Ch. 3.
|t WLAN standards --
|g Ch. 4.
|t WLAN fundamentals --
|g Ch. 5.
|t WLAN basic authentication and privacy methods --
|g Ch. 6.
|t Wireless vulnerabilities --
|g Ch. 7.
|t EAP authentication protocols for WLANs --
|g Ch. 8.
|t WLAN encryption and data integrity protocols --
|g Ch. 9.
|t SWAN : end-to-end security deployment --
|g Ch. 10.
|t Design guidelines for secure WLAN --
|g Ch. 11.
|t Operational and design considerations for secure WLANs --
|g Ch. 12.
|t WLAN security configuration guidelines and examples --
|g Ch. 13.
|t WLAN deployment examples.
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Wireless LANs
|x Security measures.
|
650 |
|
6 |
|a Réseaux locaux sans fil
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Wireless LANs
|x Security measures.
|2 fast
|0 (OCoLC)fst01176207
|
650 |
|
7 |
|a Electrical & Computer Engineering.
|2 hilcc
|
650 |
|
7 |
|a Engineering & Applied Sciences.
|2 hilcc
|
650 |
|
7 |
|a Telecommunications.
|2 hilcc
|
700 |
1 |
|
|a Sankar, Krishna.
|
776 |
0 |
8 |
|i Print version:
|t Cisco wireless LAN security.
|d Indianapolis, IN : Cisco, ©2005
|z 1587051540
|w (OCoLC)56658505
|
830 |
|
0 |
|a Cisco Press networking technology series.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/1587051540/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Internet Archive
|b INAR
|n ciscowirelesslan0000unse
|
994 |
|
|
|a 92
|b IZTAP
|