EUR 48,75
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: New. pp. 874 Illus.
EUR 87,69
Währung umrechnenAnzahl: 5 verfügbar
In den WarenkorbZustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
EUR 99,56
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Verlag: Springer-Verlag New York Inc., 2006
ISBN 10: 0387954252 ISBN 13: 9780387954257
Sprache: Englisch
Anbieter: Kennys Bookstore, Olney, MD, USA
EUR 137,67
Währung umrechnenAnzahl: 15 verfügbar
In den WarenkorbZustand: New. With the rapid deployment of wireless networks in business environments, IT professionals must implement security mechanisms that are equivalent to those for wire-based networks. This is a guide to key foundation topics and technology frameworks for designing and maintaining secure, reliable operations. Num Pages: 848 pages, biography. BIC Classification: GTC; KNTX; UKR; UT. Category: (G) General (US: Trade); (P) Professional & Vocational; (UP) Postgraduate, Research & Scholarly; (UU) Undergraduate. Dimension: 254 x 178 x 46. Weight in Grams: 3780. . 2006. Hardback. . . . . Books ship from the US and Ireland.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 158,45
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 164,47
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
EUR 178,14
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. Provides up-to-date perspective on security threatsHands-on reference for practitioners and advanced-level studentsPredictions for network architecturesA major, comprehensive professional text/reference for designing and maintain.
Verlag: Springer US, Springer New York, 2016
ISBN 10: 1489977120 ISBN 13: 9781489977120
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 168,53
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - 1. INTRODUCTION With the increasing deployment of wireless networks (802. 11 architecture) in enterprise environments, IT enterprises are working to implement security mechanisms that are equivalent to those existing today for wire-based networks. An important aspect of this is the need to provide secure access to the network for valid users. Existing wired network jacks are located inside buildings already secured from unauthorized access through the use of keys, badge access, and so forth. A user must gain physical access to the building in order to plug a client computer into a network jack. In contrast, a wireless access point (AP) may be accessed from off the premises if the signal is detectable (for instance, from a parking lot adjacent to the building). Thus, wireless networks require secure access to the AP and the ability to isolate the AP from the internal private network prior to user authentication into the network domain. Furthermore, as enterprises strive to provide better availability of mission-critical wireless data, they also face the challenge of maintaining that data's security and integrity. While each connection with a client, a supplier or a enterprise partner can improve responsiveness and efficiency, it also increases the vulnerability of enterprise wireless data to attack. In such an environment, wireless network security is becoming more important every day. Also, with the growing reliance on e-commerce, wireless network-based services and the Internet, enterprises are faced with an ever-increasing responsibility to protect their systems from attack.
Verlag: Springer-Verlag New York Inc, 2016
ISBN 10: 1489977120 ISBN 13: 9781489977120
Sprache: Englisch
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 243,32
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. reprint edition. 871 pages. 10.00x7.01x1.77 inches. In Stock.
EUR 285,25
Währung umrechnenAnzahl: 15 verfügbar
In den WarenkorbZustand: New.
EUR 247,94
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbBuch. Zustand: Neu. Neuware - 1. INTRODUCTION With the increasing deployment of wireless networks (802. 11 architecture) in enterprise environments, IT enterprises are working to implement security mechanisms that are equivalent to those existing today for wire-based networks. An important aspect of this is the need to provide secure access to the network for valid users. Existing wired network jacks are located inside buildings already secured from unauthorized access through the use of keys, badge access, and so forth. A user must gain physical access to the building in order to plug a client computer into a network jack. In contrast, a wireless access point (AP) may be accessed from off the premises if the signal is detectable (for instance, from a parking lot adjacent to the building). Thus, wireless networks require secure access to the AP and the ability to isolate the AP from the internal private network prior to user authentication into the network domain. Furthermore, as enterprises strive to provide better availability of mission-critical wireless data, they also face the challenge of maintaining that data's security and integrity. While each connection with a client, a supplier or a enterprise partner can improve responsiveness and efficiency, it also increases the vulnerability of enterprise wireless data to attack. In such an environment, wireless network security is becoming more important every day. Also, with the growing reliance on e-commerce, wireless network-based services and the Internet, enterprises are faced with an ever-increasing responsibility to protect their systems from attack.