Wireless Security End to End
暫譯: 無線安全端到端
Brian Carter, Russell Shumway
- 出版商: Hungry Minds
- 出版日期: 2002-08-22
- 售價: $1,620
- 貴賓價: 9.5 折 $1,539
- 語言: 英文
- 頁數: 360
- 裝訂: Paperback
- ISBN: 0764548867
- ISBN-13: 9780764548864
-
相關分類:
資訊安全
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$1,360$1,292 -
$1,930$1,834 -
$980$774 -
$1,740$1,653 -
$680$537 -
$690$587 -
$620$527 -
$580$458 -
$580$493 -
$720$569 -
$990$782 -
$1,045Linux Kernel Development
-
$750$638 -
$560$476 -
$720$569 -
$750$593 -
$490$382 -
$299$254 -
$450$383 -
$780$663 -
$650$507 -
$680$537 -
$980$774 -
$680$537 -
$720$569
相關主題
商品描述
Wireless Security End to End is a comprehensive guide covering encryption,
PKI, SSL, third party certificate validation, Smart card, pin authentication,
device level security, threat analysis, strategies for developing a wireless
security solution and a look ahead at future biometric technology all in the End
to End series targeted at real-world professionals.
Wireless Security End to
End is being done in the End to End series, a new series dedicated to
cutting-edge technologies designed to provide proven solutions, real-world tips
and best practices. The End to End series takes a no "techno-babble" modular
approach in explaining cutting edge wireless technology. Special features
include case studies, real-life implementations and wireless decision tree.
Table of Contents
Preface.
Part I: Introduction to Wireless Network Security.
Chapter 1: Introduction to Wireless Networking.
Chapter 2: Wireless Threat Analysis.
Chapter 3: Behind the Threat.
Part II: Network Security Components.
Chapter 4: The Network Security Model.
Chapter 5: Network Intrusion Protection.
Chapter 6: Network Intrusion Detection.
Chapter 7: Host-Based Security.
Chapter 8: Virtual Private Networking.
Chapter 9: Event Correlation.
Part III: Wireless Security Components.
Chapter 10: Secure Configuration.
Chapter 11: Secure Authentication.
Chapter 12: Encryption.
Chapter 13: Wireless Device Placement.
Part IV: Integrating Wireless Access into the Network Security Process.
Chapter 14: Logging Wireless Events.
Chapter 15: Policy Issues.
Chapter 16: Assessing Wireless Network Security.
Chapter 17: Change Control and Device Administration.
Part V: Wireless Security Models.
Chapter 18: Cisco Implementation with LEAP.
Chapter 19: WLAN Authentication and Key Management with RADIUS.
Chapter 20: Wireless Access with IPSEC.
Chapter 21: Secure Wireless Public Access.
Chapter 22: Secure Wireless Point-to-Point Connectivity.
Appendix A: Glossary of Terms.
Appendix B: Web Site References.
Index.
商品描述(中文翻譯)
無線安全端到端是一部全面的指南,涵蓋加密、PKI、SSL、第三方證書驗證、智慧卡、PIN 認證、設備層級安全、威脅分析、開發無線安全解決方案的策略,以及對未來生物識別技術的展望,所有內容均屬於針對實務專業人士的端到端系列。無線安全端到端是端到端系列的一部分,這是一個專注於尖端技術的新系列,旨在提供經過驗證的解決方案、實用建議和最佳實踐。端到端系列採取無「技術術語」的模組化方法來解釋尖端無線技術。特別的特色包括案例研究、實際實施和無線決策樹。
目錄
前言
第一部分:無線網路安全介紹
第一章:無線網路介紹
第二章:無線威脅分析
第三章:威脅背後
第二部分:網路安全組件
第四章:網路安全模型
第五章:網路入侵防護
第六章:網路入侵偵測
第七章:主機基礎安全
第八章:虛擬私人網路
第九章:事件關聯
第三部分:無線安全組件
第十章:安全配置
第十一章:安全認證
第十二章:加密
第十三章:無線設備放置
第四部分:將無線接入整合到網路安全過程中
第十四章:記錄無線事件
第十五章:政策問題
第十六章:評估無線網路安全
第十七章:變更控制和設備管理
第五部分:無線安全模型
第十八章:使用 LEAP 的 Cisco 實施
第十九章:使用 RADIUS 的 WLAN 認證和金鑰管理
第二十章:使用 IPSEC 的無線接入
第二十一章:安全的無線公共接入
第二十二章:安全的無線點對點連接
附錄 A:術語表
附錄 B:網站參考
索引