Wireless operational security /:
This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even m...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, MA :
Elsevier/Digital Press,
©2004.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired network and the wireless subnet is not separated from the wired subnet. There are approximately a dozen popular books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for wireless security, none of which address them in a practical, operationally-oriented and comprehensive way. Wireless Operational Security bridges this gap. |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource (xxvi, 468 pages) : illustrations |
Format: | Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780080521190 0080521193 9781555583170 1555583172 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn171038211 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 070912s2004 maua ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d YDXCP |d OCLCQ |d MERUC |d OCLCQ |d NTG |d OCLCE |d B24X7 |d OCLCF |d OPELS |d UKDOC |d OCLCQ |d UBY |d ZCU |d E7B |d IDEBK |d NLGGC |d OCLCQ |d OCLCA |d D6H |d VTS |d STF |d K6U |d LEAUB |d OL$ |d EYM |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d SXB |d OCLCQ |d OCLCO |d VLB | ||
019 | |a 62771201 |a 162595218 |a 441792182 |a 505064256 |a 507645338 |a 607139269 |a 646202419 |a 648244826 |a 1035686427 |a 1086508192 |a 1160105863 |a 1194734044 | ||
020 | |a 9780080521190 |q (electronic bk.) | ||
020 | |a 0080521193 |q (electronic bk.) | ||
020 | |a 9781555583170 | ||
020 | |a 1555583172 | ||
035 | |a (OCoLC)171038211 |z (OCoLC)62771201 |z (OCoLC)162595218 |z (OCoLC)441792182 |z (OCoLC)505064256 |z (OCoLC)507645338 |z (OCoLC)607139269 |z (OCoLC)646202419 |z (OCoLC)648244826 |z (OCoLC)1035686427 |z (OCoLC)1086508192 |z (OCoLC)1160105863 |z (OCoLC)1194734044 | ||
037 | |a 104110:104131 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
042 | |a dlr | ||
050 | 4 | |a QA76.9.A25 |b R588 2004eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Rittinghouse, John W. |1 https://id.oclc.org/worldcat/entity/E39PCjvpR3xThkGCQv3RVFrwmd |0 http://id.loc.gov/authorities/names/n2003002484 | |
245 | 1 | 0 | |a Wireless operational security / |c John W. Rittinghouse, James F. Ransome. |
260 | |a Burlington, MA : |b Elsevier/Digital Press, |c ©2004. | ||
300 | |a 1 online resource (xxvi, 468 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
500 | |a Includes index. | ||
505 | 0 | |a Front Cover; Wireless Operational Security; Copyright Page; Contents; List of Figures and Tables; Foreword; Preface; Acknowledgments; Section I: General Network Security; Section II: Wireless Network Security; Glossary; A Wireless Policy Essentials; B Wireless-related Legislative Links; C Additional WLAN References; Index. | |
520 | |a This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired network and the wireless subnet is not separated from the wired subnet. There are approximately a dozen popular books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for wireless security, none of which address them in a practical, operationally-oriented and comprehensive way. Wireless Operational Security bridges this gap. | ||
504 | |a Includes bibliographical references and index. | ||
506 | |3 Use copy |f Restrictions unspecified |2 star |5 MiAaHDL | ||
533 | |a Electronic reproduction. |b [Place of publication not identified] : |c HathiTrust Digital Library, |d 2010. |5 MiAaHDL | ||
538 | |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |u http://purl.oclc.org/DLF/benchrepro0212 |5 MiAaHDL | ||
583 | 1 | |a digitized |c 2010 |h HathiTrust Digital Library |l committed to preserve |2 pda |5 MiAaHDL | |
588 | 0 | |a Print version record. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
700 | 1 | |a Ransome, James F. |1 https://id.oclc.org/worldcat/entity/E39PCjKk3DMf4WBpqVMgDKjqcd |0 http://id.loc.gov/authorities/names/no2004040935 | |
758 | |i has work: |a Wireless operational security (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFM73XpxMBHP3wQQW87crm |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Rittinghouse, John W. |t Wireless operational security. |d Burlington, MA : Elsevier/Digital Press, ©2004 |z 1555583172 |z 9781555583170 |w (OCoLC)54831240 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=196566 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781555583170 |3 Volltext |
938 | |a 123Library |b 123L |n 36570 | ||
938 | |a Books 24x7 |b B247 |n bks00004073 | ||
938 | |a ebrary |b EBRY |n ebr10175605 | ||
938 | |a EBSCOhost |b EBSC |n 196566 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 102262 | ||
938 | |a YBP Library Services |b YANK |n 2614095 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn171038211 |
---|---|
_version_ | 1816881653102936064 |
adam_text | |
any_adam_object | |
author | Rittinghouse, John W. |
author2 | Ransome, James F. |
author2_role | |
author2_variant | j f r jf jfr |
author_GND | http://id.loc.gov/authorities/names/n2003002484 http://id.loc.gov/authorities/names/no2004040935 |
author_facet | Rittinghouse, John W. Ransome, James F. |
author_role | |
author_sort | Rittinghouse, John W. |
author_variant | j w r jw jwr |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 R588 2004eb |
callnumber-search | QA76.9.A25 R588 2004eb |
callnumber-sort | QA 276.9 A25 R588 42004EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Front Cover; Wireless Operational Security; Copyright Page; Contents; List of Figures and Tables; Foreword; Preface; Acknowledgments; Section I: General Network Security; Section II: Wireless Network Security; Glossary; A Wireless Policy Essentials; B Wireless-related Legislative Links; C Additional WLAN References; Index. |
ctrlnum | (OCoLC)171038211 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05411cam a2200733 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn171038211</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">070912s2004 maua ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NTG</subfield><subfield code="d">OCLCE</subfield><subfield code="d">B24X7</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OPELS</subfield><subfield code="d">UKDOC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UBY</subfield><subfield code="d">ZCU</subfield><subfield code="d">E7B</subfield><subfield code="d">IDEBK</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">D6H</subfield><subfield code="d">VTS</subfield><subfield code="d">STF</subfield><subfield code="d">K6U</subfield><subfield code="d">LEAUB</subfield><subfield code="d">OL$</subfield><subfield code="d">EYM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">VLB</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">62771201</subfield><subfield code="a">162595218</subfield><subfield code="a">441792182</subfield><subfield code="a">505064256</subfield><subfield code="a">507645338</subfield><subfield code="a">607139269</subfield><subfield code="a">646202419</subfield><subfield code="a">648244826</subfield><subfield code="a">1035686427</subfield><subfield code="a">1086508192</subfield><subfield code="a">1160105863</subfield><subfield code="a">1194734044</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080521190</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080521193</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781555583170</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1555583172</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)171038211</subfield><subfield code="z">(OCoLC)62771201</subfield><subfield code="z">(OCoLC)162595218</subfield><subfield code="z">(OCoLC)441792182</subfield><subfield code="z">(OCoLC)505064256</subfield><subfield code="z">(OCoLC)507645338</subfield><subfield code="z">(OCoLC)607139269</subfield><subfield code="z">(OCoLC)646202419</subfield><subfield code="z">(OCoLC)648244826</subfield><subfield code="z">(OCoLC)1035686427</subfield><subfield code="z">(OCoLC)1086508192</subfield><subfield code="z">(OCoLC)1160105863</subfield><subfield code="z">(OCoLC)1194734044</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">104110:104131</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="042" ind1=" " ind2=" "><subfield code="a">dlr</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">R588 2004eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rittinghouse, John W.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjvpR3xThkGCQv3RVFrwmd</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2003002484</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Wireless operational security /</subfield><subfield code="c">John W. Rittinghouse, James F. Ransome.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Burlington, MA :</subfield><subfield code="b">Elsevier/Digital Press,</subfield><subfield code="c">©2004.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxvi, 468 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Front Cover; Wireless Operational Security; Copyright Page; Contents; List of Figures and Tables; Foreword; Preface; Acknowledgments; Section I: General Network Security; Section II: Wireless Network Security; Glossary; A Wireless Policy Essentials; B Wireless-related Legislative Links; C Additional WLAN References; Index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired network and the wireless subnet is not separated from the wired subnet. There are approximately a dozen popular books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for wireless security, none of which address them in a practical, operationally-oriented and comprehensive way. Wireless Operational Security bridges this gap.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="3">Use copy</subfield><subfield code="f">Restrictions unspecified</subfield><subfield code="2">star</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction.</subfield><subfield code="b">[Place of publication not identified] :</subfield><subfield code="c">HathiTrust Digital Library,</subfield><subfield code="d">2010.</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.</subfield><subfield code="u">http://purl.oclc.org/DLF/benchrepro0212</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="583" ind1="1" ind2=" "><subfield code="a">digitized</subfield><subfield code="c">2010</subfield><subfield code="h">HathiTrust Digital Library</subfield><subfield code="l">committed to preserve</subfield><subfield code="2">pda</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ransome, James F.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjKk3DMf4WBpqVMgDKjqcd</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2004040935</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Wireless operational security (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFM73XpxMBHP3wQQW87crm</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Rittinghouse, John W.</subfield><subfield code="t">Wireless operational security.</subfield><subfield code="d">Burlington, MA : Elsevier/Digital Press, ©2004</subfield><subfield code="z">1555583172</subfield><subfield code="z">9781555583170</subfield><subfield code="w">(OCoLC)54831240</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=196566</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781555583170</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">123Library</subfield><subfield code="b">123L</subfield><subfield code="n">36570</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00004073</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10175605</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">196566</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">102262</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2614095</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn171038211 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:08Z |
institution | BVB |
isbn | 9780080521190 0080521193 9781555583170 1555583172 |
language | English |
oclc_num | 171038211 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxvi, 468 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Elsevier/Digital Press, |
record_format | marc |
spelling | Rittinghouse, John W. https://id.oclc.org/worldcat/entity/E39PCjvpR3xThkGCQv3RVFrwmd http://id.loc.gov/authorities/names/n2003002484 Wireless operational security / John W. Rittinghouse, James F. Ransome. Burlington, MA : Elsevier/Digital Press, ©2004. 1 online resource (xxvi, 468 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes index. Front Cover; Wireless Operational Security; Copyright Page; Contents; List of Figures and Tables; Foreword; Preface; Acknowledgments; Section I: General Network Security; Section II: Wireless Network Security; Glossary; A Wireless Policy Essentials; B Wireless-related Legislative Links; C Additional WLAN References; Index. This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired network and the wireless subnet is not separated from the wired subnet. There are approximately a dozen popular books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for wireless security, none of which address them in a practical, operationally-oriented and comprehensive way. Wireless Operational Security bridges this gap. Includes bibliographical references and index. Use copy Restrictions unspecified star MiAaHDL Electronic reproduction. [Place of publication not identified] : HathiTrust Digital Library, 2010. MiAaHDL Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL Print version record. Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Ransome, James F. https://id.oclc.org/worldcat/entity/E39PCjKk3DMf4WBpqVMgDKjqcd http://id.loc.gov/authorities/names/no2004040935 has work: Wireless operational security (Text) https://id.oclc.org/worldcat/entity/E39PCFM73XpxMBHP3wQQW87crm https://id.oclc.org/worldcat/ontology/hasWork Print version: Rittinghouse, John W. Wireless operational security. Burlington, MA : Elsevier/Digital Press, ©2004 1555583172 9781555583170 (OCoLC)54831240 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=196566 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781555583170 Volltext |
spellingShingle | Rittinghouse, John W. Wireless operational security / Front Cover; Wireless Operational Security; Copyright Page; Contents; List of Figures and Tables; Foreword; Preface; Acknowledgments; Section I: General Network Security; Section II: Wireless Network Security; Glossary; A Wireless Policy Essentials; B Wireless-related Legislative Links; C Additional WLAN References; Index. Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 https://id.nlm.nih.gov/mesh/D016494 |
title | Wireless operational security / |
title_auth | Wireless operational security / |
title_exact_search | Wireless operational security / |
title_full | Wireless operational security / John W. Rittinghouse, James F. Ransome. |
title_fullStr | Wireless operational security / John W. Rittinghouse, James F. Ransome. |
title_full_unstemmed | Wireless operational security / John W. Rittinghouse, James F. Ransome. |
title_short | Wireless operational security / |
title_sort | wireless operational security |
topic | Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast |
topic_facet | Computer security. Computer networks Security measures. Computer Security Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Computer security |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=196566 https://www.sciencedirect.com/science/book/9781555583170 |
work_keys_str_mv | AT rittinghousejohnw wirelessoperationalsecurity AT ransomejamesf wirelessoperationalsecurity |