|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
SCIDIR_ocn281558272 |
003 |
OCoLC |
005 |
20231117015141.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
081212s2008 maua ob 001 0 eng d |
040 |
|
|
|a OPELS
|b eng
|e pn
|c OPELS
|d OPELS
|d OCLCQ
|d BTCTA
|d BAKER
|d YDXCP
|d SINLB
|d OCLCQ
|d OCLCF
|d OCLCO
|d OCLCQ
|d OCLCO
|d D6H
|d WYU
|d LEAUB
|d UK7LJ
|d VLY
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBA799803
|2 bnb
|
016 |
7 |
|
|a 014464422
|2 Uk
|
019 |
|
|
|a 144227885
|a 162131602
|a 171555271
|a 1066446675
|a 1162227444
|
020 |
|
|
|a 9781597491938
|q (paperback)
|
020 |
|
|
|a 1597491934
|q (paperback)
|
035 |
|
|
|a (OCoLC)281558272
|z (OCoLC)144227885
|z (OCoLC)162131602
|z (OCoLC)171555271
|z (OCoLC)1066446675
|z (OCoLC)1162227444
|
050 |
|
4 |
|a QA76.9.A25
|b T72 2008eb
|
082 |
0 |
4 |
|a 005.8
|2 22
|
245 |
0 |
0 |
|a SonicWALL secure wireless network :
|b integrated solutions guide /
|c Joe Levy [and others].
|
260 |
|
|
|a Burlington, Mass. :
|b Syngress,
|c �2008.
|
300 |
|
|
|a 1 online resource (xxii, 483 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Nearly forty percent of the world's 1 billion+ Internet users are wireless. It's a truly staggering fact to think that the majority of these wireless implementations are fundamentally insecure, leaving users and private data at risk. Many wireless proprietors think that the convenience of wireless outweighs the possible risk of insecure impelentation, or that secure wireless is far too complicated to worry about deploying. SonicWALL� Secure Wireless Networks Integrated Solutions Guide provides a systematic approach to creating secure wireless networks, using the Plan, Design, Implement, and Optimize model. This introduction to wireless network security is both comprehensive and easy to understand. Using straightforward language, this book describes deployment best practices, what SonicWALL security appliances do, and how they interoperate within an existing or new network. It begins with brief overviews of the theory of risk management, the history of wireless networks, and today's top five wireless threats. Real-world case studies highlight wireless solution business drivers for education, healthcare, retail and hospitality, and government agencies, as well as their respective regulatory compliance requirements. SonicWALL believes that the days of being forced to accept inherent risk in wireless networking are over. By using modern security standards and sound network design methods, your wireless network should be just as secure as your wired network. Wireless networks can be made as secure as wired networks, and deploying this type of security can be far less complicated than you think. In this book, and through their massive product offerings, SonicWALL gives you (the secure wireless network hopeful) all of the planning, implementation, and optimizing tools you need to do wireless. Securely. * Official guide from SonicWALL * Written by SonicWALL engineers and documentation specialists * Appropriate for all audiences, from the small proprietor to the enterprise IT specialist * A complete reference to plan, design, implement, and optimize a secure wireless network with SonicWALL's extensive wireless product offerings.
|
505 |
0 |
|
|a Preface -- Using This Book -- Part 1: Planning -- Chapter 1: Introduction to Secure Wireless Networking -- Chapter 2: Planning Wireless Access Deployments -- Chapter 3: Creating and Defining a Network Security Policy -- Chapter 4: Wireless Solutions for Vertical Markets -- Part 2: Designing -- Chapter 5: SonicWALL Products Solutions Library -- Chapter 6: Three Phases for a Secure Wireless Network -- Chapter 7: Designing for User Segmentation -- Part 3: Implementing -- Phase 1: Deploying the UTM Gateway -- Chapter 8: Configuring SonicWALL UTM Gateway Appliances -- Chapter 9: Configuring User Segmentation -- Chapter 10: Configuring Distributed Wireless Devices -- Chapter 11: Configuring Wireless Guest Services for Hotspots -- Chapter 12: Configuring Virtual Access Points -- Chapter 13: Configuring RF Monitoring and Protection -- Phase 2: Deploying Secure Remote Access Solutions -- Chapter 14: Configuring Secure Remote Access Solutions -- Phase 3: Deploying Centralized Management Solutions -- Chapter 15: Configuring SonicWALL Global Management System -- Part 4: Optimizing -- Chapter 16: Optimizing Your Secure Wireless Network -- Appendix A: Configuring External Authentication Servers -- Appendix B: SonicWALL Knowledge Check -- Appendix C: Answers to SonicWALL Knowledge Check -- Bibliography -- Index.
|
504 |
|
|
|a Includes bibliographical references (pages 463-470) and index.
|
588 |
0 |
|
|a Print version record.
|
546 |
|
|
|a English.
|
650 |
|
0 |
|a Firewalls (Computer security)
|
650 |
|
0 |
|a Wireless LANs
|x Security measures.
|
650 |
|
6 |
|a Coupe-feu (S�ecurit�e informatique)
|0 (CaQQLa)201-0344221
|
650 |
|
6 |
|a R�eseaux locaux sans fil
|0 (CaQQLa)201-0365253
|x S�ecurit�e
|0 (CaQQLa)201-0373949
|x Mesures.
|0 (CaQQLa)201-0373949
|
650 |
|
7 |
|a Firewalls (Computer security)
|2 fast
|0 (OCoLC)fst00925719
|
650 |
|
7 |
|a Wireless LANs
|x Security measures
|2 fast
|0 (OCoLC)fst01176207
|
650 |
|
7 |
|a Computer Science.
|2 hilcc
|
650 |
|
7 |
|a Mathematical Theory.
|2 hilcc
|
650 |
|
7 |
|a Mathematics.
|2 hilcc
|
650 |
|
7 |
|a Engineering & Applied Sciences.
|2 hilcc
|
650 |
|
7 |
|a Physical Sciences & Mathematics.
|2 hilcc
|
700 |
1 |
|
|a Levy, Joe.
|
776 |
0 |
8 |
|i Print version:
|t SonicWALL secure wireless network.
|d Burlington, Mass. : Syngress, �2008
|z 9781597491938
|z 1597491934
|w (DLC) 2008298223
|w (OCoLC)243623959
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9781597491938
|z Texto completo
|