SonicWALL secure wireless network: integrated solutions guide
Nearly forty percent of the world's 1 billion+ Internet users are wireless. It's a truly staggering fact to think that the majority of these wireless implementations are fundamentally insecure, leaving users and private data at risk. Many wireless proprietors think that the convenience of...
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Burlington, Mass.
Syngress
© 2008
|
Schlagworte: | |
Online-Zugang: | FLA01 URL des Erstveröffentlichers |
Zusammenfassung: | Nearly forty percent of the world's 1 billion+ Internet users are wireless. It's a truly staggering fact to think that the majority of these wireless implementations are fundamentally insecure, leaving users and private data at risk. Many wireless proprietors think that the convenience of wireless outweighs the possible risk of insecure impelentation, or that secure wireless is far too complicated to worry about deploying. SonicWALLʼ Secure Wireless Networks Integrated Solutions Guide provides a systematic approach to creating secure wireless networks, using the Plan, Design, Implement, and Optimize model. This introduction to wireless network security is both comprehensive and easy to understand. Using straightforward language, this book describes deployment best practices, what SonicWALL security appliances do, and how they interoperate within an existing or new network. It begins with brief overviews of the theory of risk management, the history of wireless networks, and today's top five wireless threats. Real-world case studies highlight wireless solution business drivers for education, healthcare, retail and hospitality, and government agencies, as well as their respective regulatory compliance requirements. SonicWALL believes that the days of being forced to accept inherent risk in wireless networking are over. By using modern security standards and sound network design methods, your wireless network should be just as secure as your wired network. Wireless networks can be made as secure as wired networks, and deploying this type of security can be far less complicated than you think. In this book, and through their massive product offerings, SonicWALL gives you (the secure wireless network hopeful) all of the planning, implementation, and optimizing tools you need to do wireless. Securely. * Official guide from SonicWALL * Written by SonicWALL engineers and documentation specialists * Appropriate for all audiences, from the small proprietor to the enterprise IT specialist * A complete reference to plan, design, implement, and optimize a secure wireless network with SonicWALL's extensive wireless product offerings |
Beschreibung: | Includes bibliographical references (pages 463-470) and index |
Beschreibung: | 1 online resource (xxii, 483 pages) illustrations |
ISBN: | 9781597491938 1597491934 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046124813 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2008 |||| o||u| ||||||eng d | ||
015 | |a GBA799803 |2 dnb | ||
020 | |a 9781597491938 |9 978-1-59749-193-8 | ||
020 | |a 1597491934 |9 1-59749-193-4 | ||
035 | |a (ZDB-33-ESD)ocn281558272 | ||
035 | |a (OCoLC)281558272 | ||
035 | |a (DE-599)BVBBV046124813 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a SonicWALL secure wireless network |b integrated solutions guide |c Joe Levy [and others] |
264 | 1 | |a Burlington, Mass. |b Syngress |c © 2008 | |
300 | |a 1 online resource (xxii, 483 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references (pages 463-470) and index | ||
520 | |a Nearly forty percent of the world's 1 billion+ Internet users are wireless. It's a truly staggering fact to think that the majority of these wireless implementations are fundamentally insecure, leaving users and private data at risk. Many wireless proprietors think that the convenience of wireless outweighs the possible risk of insecure impelentation, or that secure wireless is far too complicated to worry about deploying. SonicWALLʼ Secure Wireless Networks Integrated Solutions Guide provides a systematic approach to creating secure wireless networks, using the Plan, Design, Implement, and Optimize model. This introduction to wireless network security is both comprehensive and easy to understand. Using straightforward language, this book describes deployment best practices, what SonicWALL security appliances do, and how they interoperate within an existing or new network. | ||
520 | |a It begins with brief overviews of the theory of risk management, the history of wireless networks, and today's top five wireless threats. Real-world case studies highlight wireless solution business drivers for education, healthcare, retail and hospitality, and government agencies, as well as their respective regulatory compliance requirements. SonicWALL believes that the days of being forced to accept inherent risk in wireless networking are over. By using modern security standards and sound network design methods, your wireless network should be just as secure as your wired network. Wireless networks can be made as secure as wired networks, and deploying this type of security can be far less complicated than you think. In this book, and through their massive product offerings, SonicWALL gives you (the secure wireless network hopeful) all of the planning, implementation, and optimizing tools you need to do wireless. Securely. | ||
520 | |a * Official guide from SonicWALL * Written by SonicWALL engineers and documentation specialists * Appropriate for all audiences, from the small proprietor to the enterprise IT specialist * A complete reference to plan, design, implement, and optimize a secure wireless network with SonicWALL's extensive wireless product offerings | ||
650 | 7 | |a Firewalls (Computer security) |2 fast | |
650 | 7 | |a Wireless LANs / Security measures |2 fast | |
650 | 4 | |a Firewalls (Computer security) | |
650 | 4 | |a Wireless LANs |x Security measures | |
700 | 1 | |a Levy, Joe |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597491938 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031505267 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781597491938 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180443230109696 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV046124813 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn281558272 (OCoLC)281558272 (DE-599)BVBBV046124813 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03657nmm a2200421zc 4500</leader><controlfield tag="001">BV046124813</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA799803</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491938</subfield><subfield code="9">978-1-59749-193-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597491934</subfield><subfield code="9">1-59749-193-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn281558272</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)281558272</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124813</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">SonicWALL secure wireless network</subfield><subfield code="b">integrated solutions guide</subfield><subfield code="c">Joe Levy [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, Mass.</subfield><subfield code="b">Syngress</subfield><subfield code="c">© 2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxii, 483 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 463-470) and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Nearly forty percent of the world's 1 billion+ Internet users are wireless. It's a truly staggering fact to think that the majority of these wireless implementations are fundamentally insecure, leaving users and private data at risk. Many wireless proprietors think that the convenience of wireless outweighs the possible risk of insecure impelentation, or that secure wireless is far too complicated to worry about deploying. SonicWALLʼ Secure Wireless Networks Integrated Solutions Guide provides a systematic approach to creating secure wireless networks, using the Plan, Design, Implement, and Optimize model. This introduction to wireless network security is both comprehensive and easy to understand. Using straightforward language, this book describes deployment best practices, what SonicWALL security appliances do, and how they interoperate within an existing or new network. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">It begins with brief overviews of the theory of risk management, the history of wireless networks, and today's top five wireless threats. Real-world case studies highlight wireless solution business drivers for education, healthcare, retail and hospitality, and government agencies, as well as their respective regulatory compliance requirements. SonicWALL believes that the days of being forced to accept inherent risk in wireless networking are over. By using modern security standards and sound network design methods, your wireless network should be just as secure as your wired network. Wireless networks can be made as secure as wired networks, and deploying this type of security can be far less complicated than you think. In this book, and through their massive product offerings, SonicWALL gives you (the secure wireless network hopeful) all of the planning, implementation, and optimizing tools you need to do wireless. Securely. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">* Official guide from SonicWALL * Written by SonicWALL engineers and documentation specialists * Appropriate for all audiences, from the small proprietor to the enterprise IT specialist * A complete reference to plan, design, implement, and optimize a secure wireless network with SonicWALL's extensive wireless product offerings</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Firewalls (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless LANs / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Firewalls (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless LANs</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Levy, Joe</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597491938</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031505267</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597491938</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046124813 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:50Z |
institution | BVB |
isbn | 9781597491938 1597491934 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031505267 |
oclc_num | 281558272 |
open_access_boolean | |
physical | 1 online resource (xxii, 483 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Syngress |
record_format | marc |
spelling | SonicWALL secure wireless network integrated solutions guide Joe Levy [and others] Burlington, Mass. Syngress © 2008 1 online resource (xxii, 483 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references (pages 463-470) and index Nearly forty percent of the world's 1 billion+ Internet users are wireless. It's a truly staggering fact to think that the majority of these wireless implementations are fundamentally insecure, leaving users and private data at risk. Many wireless proprietors think that the convenience of wireless outweighs the possible risk of insecure impelentation, or that secure wireless is far too complicated to worry about deploying. SonicWALLʼ Secure Wireless Networks Integrated Solutions Guide provides a systematic approach to creating secure wireless networks, using the Plan, Design, Implement, and Optimize model. This introduction to wireless network security is both comprehensive and easy to understand. Using straightforward language, this book describes deployment best practices, what SonicWALL security appliances do, and how they interoperate within an existing or new network. It begins with brief overviews of the theory of risk management, the history of wireless networks, and today's top five wireless threats. Real-world case studies highlight wireless solution business drivers for education, healthcare, retail and hospitality, and government agencies, as well as their respective regulatory compliance requirements. SonicWALL believes that the days of being forced to accept inherent risk in wireless networking are over. By using modern security standards and sound network design methods, your wireless network should be just as secure as your wired network. Wireless networks can be made as secure as wired networks, and deploying this type of security can be far less complicated than you think. In this book, and through their massive product offerings, SonicWALL gives you (the secure wireless network hopeful) all of the planning, implementation, and optimizing tools you need to do wireless. Securely. * Official guide from SonicWALL * Written by SonicWALL engineers and documentation specialists * Appropriate for all audiences, from the small proprietor to the enterprise IT specialist * A complete reference to plan, design, implement, and optimize a secure wireless network with SonicWALL's extensive wireless product offerings Firewalls (Computer security) fast Wireless LANs / Security measures fast Firewalls (Computer security) Wireless LANs Security measures Levy, Joe Sonstige oth http://www.sciencedirect.com/science/book/9781597491938 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | SonicWALL secure wireless network integrated solutions guide Firewalls (Computer security) fast Wireless LANs / Security measures fast Firewalls (Computer security) Wireless LANs Security measures |
title | SonicWALL secure wireless network integrated solutions guide |
title_auth | SonicWALL secure wireless network integrated solutions guide |
title_exact_search | SonicWALL secure wireless network integrated solutions guide |
title_full | SonicWALL secure wireless network integrated solutions guide Joe Levy [and others] |
title_fullStr | SonicWALL secure wireless network integrated solutions guide Joe Levy [and others] |
title_full_unstemmed | SonicWALL secure wireless network integrated solutions guide Joe Levy [and others] |
title_short | SonicWALL secure wireless network |
title_sort | sonicwall secure wireless network integrated solutions guide |
title_sub | integrated solutions guide |
topic | Firewalls (Computer security) fast Wireless LANs / Security measures fast Firewalls (Computer security) Wireless LANs Security measures |
topic_facet | Firewalls (Computer security) Wireless LANs / Security measures Wireless LANs Security measures |
url | http://www.sciencedirect.com/science/book/9781597491938 |
work_keys_str_mv | AT levyjoe sonicwallsecurewirelessnetworkintegratedsolutionsguide |