* Ваше сообщение будет рассмотрено и опубликовано.
Администрация магазина оставляет за собой право не публиковать
сообщения читателей в случае использования ненормативной
Protect your network and applications from wireless threats using information from the leading e-security authority
Reduce the risk of security breaches and keep your wireless communications safe with help from this comprehensive guide. Written in conjunction with wireless security experts, this authoritative resource provides you with a clear background of how wireless technology works worldwide, explains current key security protocols, shows you how to deploy a wireless LAN, and much more. You'll understand the full range of wireless network vulnerabilities and learn the characteristics of specific threats such as eavesdropping and wireless denial of service attacks. You'll also discover how to securely access business applications from wireless devices, gain real-world knowledge through numerous detailed wireless implementations, and preview emerging technologies including 3G.
This book will show you how to:
*Identify the various layers of wireless network protocols - physical, network, and application layers
*Learn the differences in wireless technologies around the globe
*Comprehend major security protocols including SSL, WTLS, 802.1x, and IPSec
*Recognize the vulnerabilities in today's wireless technologies and take steps to prevent against threats
*Alleviate data security risks associated with PDAs, cellular handsets, and other wireless devices
*Familiarize yourself with long-, medium-, and short-range wireless data networks and emerging standards
*Assess which cryptography method is best for accessing corporate applications from wireless devices
*Build a successful wireless security infrastructure using existing technologies
Safeguard your network using this definitive guide to wireless security.