Wireless operational security:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Elsevier/Digital Press
©2004
|
Schlagworte: | |
Online-Zugang: | FAW01 Volltext |
Beschreibung: | Includes index This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired netwo Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xxvi, 468 pages) |
ISBN: | 0080521193 1555583172 9780080521190 9781555583170 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042307737 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2004 |||| o||u| ||||||eng d | ||
020 | |a 0080521193 |c electronic bk. |9 0-08-052119-3 | ||
020 | |a 1555583172 |9 1-55558-317-2 | ||
020 | |a 9780080521190 |c electronic bk. |9 978-0-08-052119-0 | ||
020 | |a 9781555583170 |9 978-1-55558-317-0 | ||
035 | |a (OCoLC)171038211 | ||
035 | |a (DE-599)BVBBV042307737 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Rittinghouse, John W. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Wireless operational security |c John W. Rittinghouse, James F. Ransome |
264 | 1 | |a Burlington, MA |b Elsevier/Digital Press |c ©2004 | |
300 | |a 1 Online-Ressource (xxvi, 468 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired netwo | ||
500 | |a Includes bibliographical references and index | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks |x Security measures | |
700 | 1 | |a Ransome, James F. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781555583170 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD | ||
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027744729 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781555583170 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152893396221952 |
---|---|
any_adam_object | |
author | Rittinghouse, John W. |
author_facet | Rittinghouse, John W. |
author_role | aut |
author_sort | Rittinghouse, John W. |
author_variant | j w r jw jwr |
building | Verbundindex |
bvnumber | BV042307737 |
collection | ZDB-33-ESD |
ctrlnum | (OCoLC)171038211 (DE-599)BVBBV042307737 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02353nmm a2200481zc 4500</leader><controlfield tag="001">BV042307737</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080521193</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-052119-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1555583172</subfield><subfield code="9">1-55558-317-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080521190</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-052119-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781555583170</subfield><subfield code="9">978-1-55558-317-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)171038211</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042307737</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rittinghouse, John W.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Wireless operational security</subfield><subfield code="c">John W. Rittinghouse, James F. Ransome</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Elsevier/Digital Press</subfield><subfield code="c">©2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvi, 468 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired netwo</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ransome, James F.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781555583170</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027744729</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781555583170</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042307737 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:57Z |
institution | BVB |
isbn | 0080521193 1555583172 9780080521190 9781555583170 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027744729 |
oclc_num | 171038211 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xxvi, 468 pages) |
psigel | ZDB-33-ESD FLA_PDA_ESD ZDB-33-ESD FAW_PDA_ESD |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Elsevier/Digital Press |
record_format | marc |
spelling | Rittinghouse, John W. Verfasser aut Wireless operational security John W. Rittinghouse, James F. Ransome Burlington, MA Elsevier/Digital Press ©2004 1 Online-Ressource (xxvi, 468 pages) txt rdacontent c rdamedia cr rdacarrier Includes index This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired netwo Includes bibliographical references and index COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures Ransome, James F. Sonstige oth http://www.sciencedirect.com/science/book/9781555583170 Verlag Volltext |
spellingShingle | Rittinghouse, John W. Wireless operational security COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures |
title | Wireless operational security |
title_auth | Wireless operational security |
title_exact_search | Wireless operational security |
title_full | Wireless operational security John W. Rittinghouse, James F. Ransome |
title_fullStr | Wireless operational security John W. Rittinghouse, James F. Ransome |
title_full_unstemmed | Wireless operational security John W. Rittinghouse, James F. Ransome |
title_short | Wireless operational security |
title_sort | wireless operational security |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security Computer networks Security measures |
url | http://www.sciencedirect.com/science/book/9781555583170 |
work_keys_str_mv | AT rittinghousejohnw wirelessoperationalsecurity AT ransomejamesf wirelessoperationalsecurity |