How to cheat at securing a wireless network /:
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless network With the in...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, Mass. :
Syngress,
2006.
|
Schriftenreihe: | How to Cheat Ser.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless network With the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the networks vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users. A practical product and technology specific guideline to securing a wireless networks for the busy System Administrator Takes a simplified multi-layered approach into easily deployed plans for a straight forward understanding Does not bog you down with history, but offers practical useful information for today. |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource (xxv, 453 pages) : illustrations. |
ISBN: | 1429416599 9781429416597 9780080508221 0080508227 9781597490870 1597490873 1281078336 9781281078339 9786611078331 6611078339 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm76968243 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 061214s2006 maua of 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d OCLCQ |d SHH |d IDEBK |d OCLCQ |d B24X7 |d OCLCQ |d OCLCO |d OCLCF |d OPELS |d OKU |d ZCU |d MERUC |d CCO |d E7B |d UAB |d DKDLA |d FVL |d CSU |d UMI |d DEBSZ |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d AU@ |d OCLCO |d OCLCQ |d OCLCO |d COO |d OCL |d OCLCO |d AZK |d OCLCO |d JBG |d AGLDB |d COCUF |d CNNOR |d MOR |d PIFBR |d LIV |d OCLCQ |d U3W |d STF |d BRL |d WRM |d D6H |d WCO |d VTS |d CEF |d NRAMU |d OCLCQ |d INT |d VT2 |d OCLCQ |d WYU |d A6Q |d OCLCQ |d LEAUB |d M8D |d VLY |d UKCRE |d S2H |d OCLCO |d OCLCQ |d IOY |d OCLCO |d OCLCQ |d OCLCL |d OCLCQ | ||
019 | |a 83260698 |a 144618670 |a 148771161 |a 162597510 |a 181421147 |a 474279999 |a 507230086 |a 560262779 |a 647612964 |a 722517604 |a 728026777 |a 780990676 |a 823830732 |a 823900443 |a 824091775 |a 824140016 |a 824876117 |a 872053380 |a 888556789 |a 961570581 |a 962606508 |a 988468728 |a 991945119 |a 1035693049 |a 1037503715 |a 1037732177 |a 1038699811 |a 1045513773 |a 1055383874 |a 1076285790 |a 1081267987 |a 1153017344 |a 1162257507 |a 1189798892 |a 1192348024 |a 1228599361 |a 1240508296 | ||
020 | |a 1429416599 |q (electronic bk.) | ||
020 | |a 9781429416597 |q (electronic bk.) | ||
020 | |a 9780080508221 |q (electronic bk.) | ||
020 | |a 0080508227 |q (electronic bk.) | ||
020 | |a 9781597490870 | ||
020 | |a 1597490873 | ||
020 | |a 1281078336 | ||
020 | |a 9781281078339 | ||
020 | |a 9786611078331 | ||
020 | |a 6611078339 | ||
024 | 1 | |a 792502908730 | |
035 | |a (OCoLC)76968243 |z (OCoLC)83260698 |z (OCoLC)144618670 |z (OCoLC)148771161 |z (OCoLC)162597510 |z (OCoLC)181421147 |z (OCoLC)474279999 |z (OCoLC)507230086 |z (OCoLC)560262779 |z (OCoLC)647612964 |z (OCoLC)722517604 |z (OCoLC)728026777 |z (OCoLC)780990676 |z (OCoLC)823830732 |z (OCoLC)823900443 |z (OCoLC)824091775 |z (OCoLC)824140016 |z (OCoLC)824876117 |z (OCoLC)872053380 |z (OCoLC)888556789 |z (OCoLC)961570581 |z (OCoLC)962606508 |z (OCoLC)988468728 |z (OCoLC)991945119 |z (OCoLC)1035693049 |z (OCoLC)1037503715 |z (OCoLC)1037732177 |z (OCoLC)1038699811 |z (OCoLC)1045513773 |z (OCoLC)1055383874 |z (OCoLC)1076285790 |z (OCoLC)1081267987 |z (OCoLC)1153017344 |z (OCoLC)1162257507 |z (OCoLC)1189798892 |z (OCoLC)1192348024 |z (OCoLC)1228599361 |z (OCoLC)1240508296 | ||
037 | |a 134744:134875 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a TK5105.78 |b .H68 2006eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a UTN |2 bicssc | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Hurley, Chris. |0 http://id.loc.gov/authorities/names/no2004069546 | |
245 | 1 | 0 | |a How to cheat at securing a wireless network / |c Chris Hurley [and others]. |
260 | |a Rockland, Mass. : |b Syngress, |c 2006. | ||
300 | |a 1 online resource (xxv, 453 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file |2 rda | ||
490 | 1 | |a How to Cheat Ser. | |
500 | |a Includes index. | ||
505 | 0 | |a Introduction to wireless : from past to present -- Wireless security -- Dangers of wireless devices in the workplace -- WLAN rogue access point detection and mitigation -- Wireless LAN VLANs -- Designing a wireless network -- Wireless network architecture and design -- Monitoring and intrusion detection -- Designing a wireless enterprise network : hospital case study -- Designing a wireless industrial network : retail case study -- Designing a wireless home network : home office case study -- Wireless penetration testing. | |
520 | |a Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless network With the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the networks vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users. A practical product and technology specific guideline to securing a wireless networks for the busy System Administrator Takes a simplified multi-layered approach into easily deployed plans for a straight forward understanding Does not bog you down with history, but offers practical useful information for today. | ||
588 | 0 | |a Print version record. | |
546 | |a English. | ||
650 | 0 | |a Wireless LANs |x Security measures. | |
650 | 6 | |a Réseaux locaux sans fil |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Wireless LANs |x Security measures |2 fast | |
655 | 0 | |a Electronic books. | |
655 | 7 | |a handbooks. |2 aat | |
655 | 7 | |a manuals (instructional materials) |2 aat | |
655 | 7 | |a Handbooks and manuals |2 fast | |
655 | 7 | |a Handbooks and manuals. |2 lcgft |0 http://id.loc.gov/authorities/genreForms/gf2014026109 | |
655 | 7 | |a Guides et manuels. |2 rvmgf | |
776 | 0 | 8 | |i Print version: |a Hurley, Chris. |t How to cheat at securing a wireless network. |d Rockland, Mass. : Syngress, 2006 |z 1597490873 |w (OCoLC)70264803 |
830 | 0 | |a How to Cheat Ser. | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597490870 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=173422 |3 Volltext |
938 | |a Books 24x7 |b B247 |n bks00014604 | ||
938 | |a ebrary |b EBRY |n ebr10150166 | ||
938 | |a EBSCOhost |b EBSC |n 173422 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 107833 | ||
938 | |a YBP Library Services |b YANK |n 2500067 | ||
938 | |a YBP Library Services |b YANK |n 2730653 | ||
938 | |a YBP Library Services |b YANK |n 2627206 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm76968243 |
---|---|
_version_ | 1816881643500077056 |
adam_text | |
any_adam_object | |
author | Hurley, Chris |
author_GND | http://id.loc.gov/authorities/names/no2004069546 |
author_facet | Hurley, Chris |
author_role | |
author_sort | Hurley, Chris |
author_variant | c h ch |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.78 .H68 2006eb |
callnumber-search | TK5105.78 .H68 2006eb |
callnumber-sort | TK 45105.78 H68 42006EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Introduction to wireless : from past to present -- Wireless security -- Dangers of wireless devices in the workplace -- WLAN rogue access point detection and mitigation -- Wireless LAN VLANs -- Designing a wireless network -- Wireless network architecture and design -- Monitoring and intrusion detection -- Designing a wireless enterprise network : hospital case study -- Designing a wireless industrial network : retail case study -- Designing a wireless home network : home office case study -- Wireless penetration testing. |
ctrlnum | (OCoLC)76968243 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06151cam a2200817 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm76968243 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">061214s2006 maua of 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SHH</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">B24X7</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OPELS</subfield><subfield code="d">OKU</subfield><subfield code="d">ZCU</subfield><subfield code="d">MERUC</subfield><subfield code="d">CCO</subfield><subfield code="d">E7B</subfield><subfield code="d">UAB</subfield><subfield code="d">DKDLA</subfield><subfield code="d">FVL</subfield><subfield code="d">CSU</subfield><subfield code="d">UMI</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">COO</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AZK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">JBG</subfield><subfield code="d">AGLDB</subfield><subfield code="d">COCUF</subfield><subfield code="d">CNNOR</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFBR</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">STF</subfield><subfield code="d">BRL</subfield><subfield code="d">WRM</subfield><subfield code="d">D6H</subfield><subfield code="d">WCO</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">NRAMU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">A6Q</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LEAUB</subfield><subfield code="d">M8D</subfield><subfield code="d">VLY</subfield><subfield code="d">UKCRE</subfield><subfield code="d">S2H</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IOY</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">83260698</subfield><subfield code="a">144618670</subfield><subfield code="a">148771161</subfield><subfield code="a">162597510</subfield><subfield code="a">181421147</subfield><subfield code="a">474279999</subfield><subfield code="a">507230086</subfield><subfield code="a">560262779</subfield><subfield code="a">647612964</subfield><subfield code="a">722517604</subfield><subfield code="a">728026777</subfield><subfield code="a">780990676</subfield><subfield code="a">823830732</subfield><subfield code="a">823900443</subfield><subfield code="a">824091775</subfield><subfield code="a">824140016</subfield><subfield code="a">824876117</subfield><subfield code="a">872053380</subfield><subfield code="a">888556789</subfield><subfield code="a">961570581</subfield><subfield code="a">962606508</subfield><subfield code="a">988468728</subfield><subfield code="a">991945119</subfield><subfield code="a">1035693049</subfield><subfield code="a">1037503715</subfield><subfield code="a">1037732177</subfield><subfield code="a">1038699811</subfield><subfield code="a">1045513773</subfield><subfield code="a">1055383874</subfield><subfield code="a">1076285790</subfield><subfield code="a">1081267987</subfield><subfield code="a">1153017344</subfield><subfield code="a">1162257507</subfield><subfield code="a">1189798892</subfield><subfield code="a">1192348024</subfield><subfield code="a">1228599361</subfield><subfield code="a">1240508296</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1429416599</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781429416597</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080508221</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080508227</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490870</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490873</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281078336</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281078339</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611078331</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611078339</subfield></datafield><datafield tag="024" ind1="1" ind2=" "><subfield code="a">792502908730</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)76968243</subfield><subfield code="z">(OCoLC)83260698</subfield><subfield code="z">(OCoLC)144618670</subfield><subfield code="z">(OCoLC)148771161</subfield><subfield code="z">(OCoLC)162597510</subfield><subfield code="z">(OCoLC)181421147</subfield><subfield code="z">(OCoLC)474279999</subfield><subfield code="z">(OCoLC)507230086</subfield><subfield code="z">(OCoLC)560262779</subfield><subfield code="z">(OCoLC)647612964</subfield><subfield code="z">(OCoLC)722517604</subfield><subfield code="z">(OCoLC)728026777</subfield><subfield code="z">(OCoLC)780990676</subfield><subfield code="z">(OCoLC)823830732</subfield><subfield code="z">(OCoLC)823900443</subfield><subfield code="z">(OCoLC)824091775</subfield><subfield code="z">(OCoLC)824140016</subfield><subfield code="z">(OCoLC)824876117</subfield><subfield code="z">(OCoLC)872053380</subfield><subfield code="z">(OCoLC)888556789</subfield><subfield code="z">(OCoLC)961570581</subfield><subfield code="z">(OCoLC)962606508</subfield><subfield code="z">(OCoLC)988468728</subfield><subfield code="z">(OCoLC)991945119</subfield><subfield code="z">(OCoLC)1035693049</subfield><subfield code="z">(OCoLC)1037503715</subfield><subfield code="z">(OCoLC)1037732177</subfield><subfield code="z">(OCoLC)1038699811</subfield><subfield code="z">(OCoLC)1045513773</subfield><subfield code="z">(OCoLC)1055383874</subfield><subfield code="z">(OCoLC)1076285790</subfield><subfield code="z">(OCoLC)1081267987</subfield><subfield code="z">(OCoLC)1153017344</subfield><subfield code="z">(OCoLC)1162257507</subfield><subfield code="z">(OCoLC)1189798892</subfield><subfield code="z">(OCoLC)1192348024</subfield><subfield code="z">(OCoLC)1228599361</subfield><subfield code="z">(OCoLC)1240508296</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">134744:134875</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.78</subfield><subfield code="b">.H68 2006eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UTN</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hurley, Chris.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2004069546</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">How to cheat at securing a wireless network /</subfield><subfield code="c">Chris Hurley [and others].</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, Mass. :</subfield><subfield code="b">Syngress,</subfield><subfield code="c">2006.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxv, 453 pages) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">How to Cheat Ser.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introduction to wireless : from past to present -- Wireless security -- Dangers of wireless devices in the workplace -- WLAN rogue access point detection and mitigation -- Wireless LAN VLANs -- Designing a wireless network -- Wireless network architecture and design -- Monitoring and intrusion detection -- Designing a wireless enterprise network : hospital case study -- Designing a wireless industrial network : retail case study -- Designing a wireless home network : home office case study -- Wireless penetration testing.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless network With the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the networks vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users. A practical product and technology specific guideline to securing a wireless networks for the busy System Administrator Takes a simplified multi-layered approach into easily deployed plans for a straight forward understanding Does not bog you down with history, but offers practical useful information for today.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Wireless LANs</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux locaux sans fil</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless LANs</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="0"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">handbooks.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">manuals (instructional materials)</subfield><subfield code="2">aat</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Handbooks and manuals</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Handbooks and manuals.</subfield><subfield code="2">lcgft</subfield><subfield code="0">http://id.loc.gov/authorities/genreForms/gf2014026109</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Guides et manuels.</subfield><subfield code="2">rvmgf</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Hurley, Chris.</subfield><subfield code="t">How to cheat at securing a wireless network.</subfield><subfield code="d">Rockland, Mass. : Syngress, 2006</subfield><subfield code="z">1597490873</subfield><subfield code="w">(OCoLC)70264803</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">How to Cheat Ser.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597490870</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=173422</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00014604</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10150166</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">173422</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">107833</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2500067</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2730653</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2627206</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic books. handbooks. aat manuals (instructional materials) aat Handbooks and manuals fast Handbooks and manuals. lcgft http://id.loc.gov/authorities/genreForms/gf2014026109 Guides et manuels. rvmgf |
genre_facet | Electronic books. handbooks. manuals (instructional materials) Handbooks and manuals Handbooks and manuals. Guides et manuels. |
id | ZDB-4-EBA-ocm76968243 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:15:59Z |
institution | BVB |
isbn | 1429416599 9781429416597 9780080508221 0080508227 9781597490870 1597490873 1281078336 9781281078339 9786611078331 6611078339 |
language | English |
oclc_num | 76968243 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxv, 453 pages) : illustrations. |
psigel | ZDB-4-EBA |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Syngress, |
record_format | marc |
series | How to Cheat Ser. |
series2 | How to Cheat Ser. |
spelling | Hurley, Chris. http://id.loc.gov/authorities/names/no2004069546 How to cheat at securing a wireless network / Chris Hurley [and others]. Rockland, Mass. : Syngress, 2006. 1 online resource (xxv, 453 pages) : illustrations. text txt rdacontent computer c rdamedia online resource cr rdacarrier data file rda How to Cheat Ser. Includes index. Introduction to wireless : from past to present -- Wireless security -- Dangers of wireless devices in the workplace -- WLAN rogue access point detection and mitigation -- Wireless LAN VLANs -- Designing a wireless network -- Wireless network architecture and design -- Monitoring and intrusion detection -- Designing a wireless enterprise network : hospital case study -- Designing a wireless industrial network : retail case study -- Designing a wireless home network : home office case study -- Wireless penetration testing. Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless network With the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the networks vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users. A practical product and technology specific guideline to securing a wireless networks for the busy System Administrator Takes a simplified multi-layered approach into easily deployed plans for a straight forward understanding Does not bog you down with history, but offers practical useful information for today. Print version record. English. Wireless LANs Security measures. Réseaux locaux sans fil Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Wireless LANs Security measures fast Electronic books. handbooks. aat manuals (instructional materials) aat Handbooks and manuals fast Handbooks and manuals. lcgft http://id.loc.gov/authorities/genreForms/gf2014026109 Guides et manuels. rvmgf Print version: Hurley, Chris. How to cheat at securing a wireless network. Rockland, Mass. : Syngress, 2006 1597490873 (OCoLC)70264803 FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597490870 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=173422 Volltext |
spellingShingle | Hurley, Chris How to cheat at securing a wireless network / How to Cheat Ser. Introduction to wireless : from past to present -- Wireless security -- Dangers of wireless devices in the workplace -- WLAN rogue access point detection and mitigation -- Wireless LAN VLANs -- Designing a wireless network -- Wireless network architecture and design -- Monitoring and intrusion detection -- Designing a wireless enterprise network : hospital case study -- Designing a wireless industrial network : retail case study -- Designing a wireless home network : home office case study -- Wireless penetration testing. Wireless LANs Security measures. Réseaux locaux sans fil Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Wireless LANs Security measures fast |
subject_GND | http://id.loc.gov/authorities/genreForms/gf2014026109 |
title | How to cheat at securing a wireless network / |
title_auth | How to cheat at securing a wireless network / |
title_exact_search | How to cheat at securing a wireless network / |
title_full | How to cheat at securing a wireless network / Chris Hurley [and others]. |
title_fullStr | How to cheat at securing a wireless network / Chris Hurley [and others]. |
title_full_unstemmed | How to cheat at securing a wireless network / Chris Hurley [and others]. |
title_short | How to cheat at securing a wireless network / |
title_sort | how to cheat at securing a wireless network |
topic | Wireless LANs Security measures. Réseaux locaux sans fil Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Wireless LANs Security measures fast |
topic_facet | Wireless LANs Security measures. Réseaux locaux sans fil Sécurité Mesures. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Wireless LANs Security measures Electronic books. handbooks. manuals (instructional materials) Handbooks and manuals Handbooks and manuals. Guides et manuels. |
url | https://www.sciencedirect.com/science/book/9781597490870 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=173422 |
work_keys_str_mv | AT hurleychris howtocheatatsecuringawirelessnetwork |