Temporarily out of stock.
Order now and we'll deliver when available. We'll e-mail you with an estimated delivery date as soon as we have more information. Your account will only be charged when we ship the item.
Ships from and sold by Amazon.ca. Gift-wrap available.
Quantity:1
Wireless Security End-to-... has been added to your Cart
+ CDN$ 6.49 shipping
Used: Good | Details
Sold by bwbuk_ltd
Condition: Used: Good
Comment: Ships from the UK. Former Library book. Shows some signs of wear, and may have some markings on the inside. 100% Money Back Guarantee. Your purchase also supports literacy charities.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Wireless Security End-to-End Paperback – Sep 5 2002

5 out of 5 stars 1 customer review

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
Paperback
"Please retry"
CDN$ 47.99
CDN$ 32.53 CDN$ 2.58

Unlimited FREE Two-Day Shipping for Six Months When You Try Amazon Student

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your e-mail address or mobile phone number.




Product Details

  • Paperback: 360 pages
  • Publisher: Wiley; 1 edition (Sept. 5 2002)
  • Language: English
  • ISBN-10: 0764548867
  • ISBN-13: 978-0764548864
  • Product Dimensions: 18.9 x 2.1 x 23.4 cm
  • Shipping Weight: 522 g
  • Average Customer Review: 5.0 out of 5 stars 1 customer review
  • Amazon Bestsellers Rank: #3,504,542 in Books (See Top 100 in Books)
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

  • See Complete Table of Contents

Product Description

Review

"...this book has convinced me..." (Communications News, February 2003)

From the Back Cover

* A Practical Guide for IT Professionals
* Comprehensive "End-to-End" Coverage
* Real-World Perspectives, Strategies, and Solutions

The growth of 802.11b wireless LANs and other wireless technologies-including Bluetooth and WAP-has opened up a whole new frontier in network security. This practical, hands-on guide leads you through the wilderness of competing wireless security solutions-and shows you how to determine the best mix of security components for your organization. Covering everything from intrusion protection and detection to VPNs, event correlation, encryption, antenna placement, and the pros and cons of specific wireless security models, it's all you need to settle on the right wireless security plan-and get it implemented.

Lock Down Wireless Networks
* Understand the five typical wireless security threats
* Discover how network security impacts wireless security, from intrusion protection and detection to host-based security, VPNs, and event correlation
* Get the scoop on wireless security components-WEP and other built-in WLAN features, authentication, encryption, and device placement
* Find out how to integrate wireless into the network security process, from event logging and policies to assessments and change control
* Get detailed advice on implementing specific solutions-LEAP, RADIUS, and an IPSEC VPN client
* Learn how to secure public wireless networks in a café or kiosk and implement secure point-to-point connections for remote or branch offices

Your Hands-on Guide to the Wireless Future

See all Product Description

Inside This Book

(Learn More)
First Sentence
THERE ARE SEVERAL TYPES OF wireless communication in use today. Read the first page
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Customer Reviews

5.0 out of 5 stars
5 star
1
4 star
0
3 star
0
2 star
0
1 star
0
See the customer review
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback
I have to admit I was very naive about wireless security, hence the need to educate myself. The problem is there is so much noise out there, misleading, conflicting or confusing information regarding the topic. This was the first book I was able to really walk away from feeling very comfortable that I covered the most important angles.
Right off the bat I was happy to find that it's very "vendor agnostic", not focusing on tools or techniques that are unique to certain commercial systems. The pace of the book is good, first walking you through the basics of wireless network security, then moving into the components of network security then how they relate to wireless networks. It's also nice that they have an entire chapter dedicated to integrating wireless access into an existing network - something most of us are needing to do these days. Lastly, it covers a variety of differing security models. These become very helpful because you can use them as a basis for cumstomizing your own wireless security system.
Overall, if you're a network security professional looking for a good solid foundation in how it pertains to wireless networks, this a great book to have around.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: HASH(0xa1789dec) out of 5 stars 1 review
6 of 6 people found the following review helpful
HASH(0xa24e74a4) out of 5 stars Detailed and Concise Jan. 26 2003
By Brandon Davis - Published on Amazon.com
Format: Paperback
I have to admit I was very naive about wireless security, hence the need to educate myself. The problem is there is so much noise out there, misleading, conflicting or confusing information regarding the topic. This was the first book I was able to really walk away from feeling very comfortable that I covered the most important angles.
Right off the bat I was happy to find that it's very "vendor agnostic", not focusing on tools or techniques that are unique to certain commercial systems. The pace of the book is good, first walking you through the basics of wireless network security, then moving into the components of network security then how they relate to wireless networks. It's also nice that they have an entire chapter dedicated to integrating wireless access into an existing network - something most of us are needing to do these days. Lastly, it covers a variety of differing security models. These become very helpful because you can use them as a basis for cumstomizing your own wireless security system.
Overall, if you're a network security professional looking for a good solid foundation in how it pertains to wireless networks, this a great book to have around.


Feedback