Wireless Operational Security at Meripustak

Wireless Operational Security

Books from same Author: John CISM PhD Rittinghouse , James F. CISSP CISM PhD Ransome

Books from same Publisher: ELSEVIER SCIENCE & TECHNOLOGY

Related Category: Author List / Publisher List


  • Retail Price: ₹ 8767/- [ 20.00% off ]

    Seller Price: ₹ 7014

Sold By: T K Pandey      Click for Bulk Order

Offer 1: Get ₹ 111 extra discount on minimum ₹ 500 [Use Code: Bharat]

Offer 2: Get 20.00 % + Flat ₹ 100 discount on shopping of ₹ 1500 [Use Code: IND100]

Offer 3: Get 20.00 % + Flat ₹ 300 discount on shopping of ₹ 5000 [Use Code: MPSTK300]

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

Free Shipping Available



Click for International Orders
  • Provide Fastest Delivery

  • 100% Original Guaranteed
  • General Information  
    Author(s)John CISM PhD Rittinghouse , James F. CISSP CISM PhD Ransome
    PublisherELSEVIER SCIENCE & TECHNOLOGY
    ISBN9781555583170
    Pages468
    BindingPaperback 
    LanguageEnglish
    Publish YearMay 2004

    Description

    ELSEVIER SCIENCE & TECHNOLOGY Wireless Operational Security by John CISM PhD Rittinghouse , James F. CISSP CISM PhD Ransome

    This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired network and the wireless subnet is not separated from the wired subnet. There are approximately a dozen popular books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for wireless security, none of which address them in a practical, operationally-oriented and comprehensive way. Wireless Operational Security bridges this gap.