Buy Used
CDN$ 0.31
+ CDN$ 6.49 shipping
Used: Good | Details
Sold by Books Squared
Condition: Used: Good
Comment: Ships from the USA. Please allow 14-21 business days for delivery. Only lightly used. Book has minimal wear to cover and binding. A few pages may have small creases and minimal underlining. Book Selection as BIG as Texas.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Wireless Security End-to-End Paperback – Aug 22 2002

5.0 out of 5 stars 1 customer review

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
Paperback
"Please retry"
CDN$ 33.29 CDN$ 0.31

Harry Potter and the Cursed Child
click to open popover

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.




Product Details

  • Paperback: 360 pages
  • Publisher: Wiley; 1 edition (Sept. 5 2002)
  • Language: English
  • ISBN-10: 0764548867
  • ISBN-13: 978-0764548864
  • Product Dimensions: 18.9 x 2.1 x 23.4 cm
  • Shipping Weight: 522 g
  • Average Customer Review: 5.0 out of 5 stars 1 customer review
  • Amazon Bestsellers Rank: #3,680,543 in Books (See Top 100 in Books)
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

  • See Complete Table of Contents

Product Description

Review

"...this book has convinced me..." (Communications News, February 2003)

From the Back Cover

* A Practical Guide for IT Professionals
* Comprehensive "End-to-End" Coverage
* Real-World Perspectives, Strategies, and Solutions

The growth of 802.11b wireless LANs and other wireless technologies-including Bluetooth and WAP-has opened up a whole new frontier in network security. This practical, hands-on guide leads you through the wilderness of competing wireless security solutions-and shows you how to determine the best mix of security components for your organization. Covering everything from intrusion protection and detection to VPNs, event correlation, encryption, antenna placement, and the pros and cons of specific wireless security models, it's all you need to settle on the right wireless security plan-and get it implemented.

Lock Down Wireless Networks
* Understand the five typical wireless security threats
* Discover how network security impacts wireless security, from intrusion protection and detection to host-based security, VPNs, and event correlation
* Get the scoop on wireless security components-WEP and other built-in WLAN features, authentication, encryption, and device placement
* Find out how to integrate wireless into the network security process, from event logging and policies to assessments and change control
* Get detailed advice on implementing specific solutions-LEAP, RADIUS, and an IPSEC VPN client
* Learn how to secure public wireless networks in a café or kiosk and implement secure point-to-point connections for remote or branch offices

Your Hands-on Guide to the Wireless Future

See all Product Description

Customer Reviews

5.0 out of 5 stars
5 star
1
4 star
0
3 star
0
2 star
0
1 star
0
See the customer review
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback
I have to admit I was very naive about wireless security, hence the need to educate myself. The problem is there is so much noise out there, misleading, conflicting or confusing information regarding the topic. This was the first book I was able to really walk away from feeling very comfortable that I covered the most important angles.
Right off the bat I was happy to find that it's very "vendor agnostic", not focusing on tools or techniques that are unique to certain commercial systems. The pace of the book is good, first walking you through the basics of wireless network security, then moving into the components of network security then how they relate to wireless networks. It's also nice that they have an entire chapter dedicated to integrating wireless access into an existing network - something most of us are needing to do these days. Lastly, it covers a variety of differing security models. These become very helpful because you can use them as a basis for cumstomizing your own wireless security system.
Overall, if you're a network security professional looking for a good solid foundation in how it pertains to wireless networks, this a great book to have around.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: HASH(0x9bfb6f84) out of 5 stars 1 review
6 of 6 people found the following review helpful
HASH(0x9bfc29cc) out of 5 stars Detailed and Concise Jan. 26 2003
By Brandon Davis - Published on Amazon.com
Format: Paperback
I have to admit I was very naive about wireless security, hence the need to educate myself. The problem is there is so much noise out there, misleading, conflicting or confusing information regarding the topic. This was the first book I was able to really walk away from feeling very comfortable that I covered the most important angles.
Right off the bat I was happy to find that it's very "vendor agnostic", not focusing on tools or techniques that are unique to certain commercial systems. The pace of the book is good, first walking you through the basics of wireless network security, then moving into the components of network security then how they relate to wireless networks. It's also nice that they have an entire chapter dedicated to integrating wireless access into an existing network - something most of us are needing to do these days. Lastly, it covers a variety of differing security models. These become very helpful because you can use them as a basis for cumstomizing your own wireless security system.
Overall, if you're a network security professional looking for a good solid foundation in how it pertains to wireless networks, this a great book to have around.


Feedback