๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Wireless Network Security: Second Edition

โœ Scribed by Wolfgang Osterhage


Publisher
CRC Press
Year
2018
Tongue
English
Leaves
203
Edition
Second edition
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Wireless communications have become indispensable part of our lives. The book deals with the security of such wireless communication. The technological background of these applications have been presented in detail. Special emphasis has been laid on the IEEE 802.11x-standards that have been developed for this technology. A major part of the book is devoted to security risks, encryption and authentication. Checklists have been provided to help IT administrators and security officers to achieve the maximum possible security in their installations, when using wireless technology.



This is the second edition of the book. The updates include the latest the IEEE 802.11-standard, an updated chapter on PDA, the increased relevance of smart phones and tablets, widespread use of WLAN with increased security risks.

โœฆ Table of Contents


Content: PrefaceIntroduction Network Security Introduction Weaknesses in Network Security Relevant Resources Objectives of a Security Strategy Security Aspects concerning the Internet WLAN WLAN Basic Principles IEEE 802.11 Overview Wireless Fidelity WMAN Key Terminology Architecture and Components Security Requirements Recent Developments Mobile Phones ContextBasic Principles Communication Protocols Services Mobile Phones and WLAN Threats and Protection Special Case Blackberries VoIP Security Check Directive Checklist Bluetooth Introduction Technical BasicsSystem Topology Connecting to the Network Version Security Aspects Risk Potentials Countermeasures Checklist Infra Red Background IrDA Applications Security Aspects Checklist Near Field CommunicationIntroduction Technology Specifications Security Aspects Conclusions Security Policy Introduction Scope Information and Communication Security Physical Security Documentation Wireless Security Summary Emergency Management in Communication Networks Emergency Management Systems Standards Requirements for Businesses BCM Overview Training and Testing Contents of an Emergency Concept (Documentation) Intermediate Conclusions The Emergency Process References

โœฆ Subjects


Wireless communication systems -- Security measures;Mobile communication systems -- Security measures;Wireless LANs -- Security measures;TECHNOLOGY & ENGINEERING / Telecommunication


๐Ÿ“œ SIMILAR VOLUMES


Industrial Network Security, Second Edit
โœ Teumim, David J ๐Ÿ“‚ Library ๐Ÿ“… 2010 ๐Ÿ› International Society of Automation;ISA ๐ŸŒ English

Nowadays one only needs to read the newspaper headlines to appreciate the importance of Industrial Network Security. Almost daily an article comes out describing the threat to our critical infrastructure, from spies in our electrical grid to the looming threat of cyberwar.<P>Whether we talk about pr

Industrial Network Security, Second Edit
โœ Teumim, David J ๐Ÿ“‚ Library ๐Ÿ“… 2010 ๐Ÿ› International Society of Automation;ISA ๐ŸŒ English

Nowadays one only needs to read the newspaper headlines to appreciate the importance of Industrial Network Security. Almost daily an article comes out describing the threat to our critical infrastructure, from spies in our electrical grid to the looming threat of cyberwar.<P>Whether we talk about pr

Network and System Security, Second Edit
โœ John R. Vacca ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Syngress ๐ŸŒ English

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the a

Network and System Security, Second Edit
โœ John R. Vacca ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Syngress ๐ŸŒ English

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the a