SonicWALL secure wireless network : integrated solutions guide /
Nearly forty percent of the world's 1 billion+ Internet users are wireless. It's a truly staggering fact to think that the majority of these wireless implementations are fundamentally insecure, leaving users and private data at risk. Many wireless proprietors think that the convenience of...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Burlington, Mass. :
Syngress,
�2008.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Preface
- Using This Book
- Part 1: Planning
- Chapter 1: Introduction to Secure Wireless Networking
- Chapter 2: Planning Wireless Access Deployments
- Chapter 3: Creating and Defining a Network Security Policy
- Chapter 4: Wireless Solutions for Vertical Markets
- Part 2: Designing
- Chapter 5: SonicWALL Products Solutions Library
- Chapter 6: Three Phases for a Secure Wireless Network
- Chapter 7: Designing for User Segmentation
- Part 3: Implementing
- Phase 1: Deploying the UTM Gateway
- Chapter 8: Configuring SonicWALL UTM Gateway Appliances
- Chapter 9: Configuring User Segmentation
- Chapter 10: Configuring Distributed Wireless Devices
- Chapter 11: Configuring Wireless Guest Services for Hotspots
- Chapter 12: Configuring Virtual Access Points
- Chapter 13: Configuring RF Monitoring and Protection
- Phase 2: Deploying Secure Remote Access Solutions
- Chapter 14: Configuring Secure Remote Access Solutions
- Phase 3: Deploying Centralized Management Solutions
- Chapter 15: Configuring SonicWALL Global Management System
- Part 4: Optimizing
- Chapter 16: Optimizing Your Secure Wireless Network
- Appendix A: Configuring External Authentication Servers
- Appendix B: SonicWALL Knowledge Check
- Appendix C: Answers to SonicWALL Knowledge Check
- Bibliography
- Index.