Normal view MARC view ISBD view

Wireless network security / by Wolfgang Osterhage.

By: Osterhage, Wolfgang [author.].
Contributor(s): Taylor and Francis.
Material type: materialTypeLabelBookPublisher: Boca Raton, FL : CRC Press, an imprint of Taylor and Francis, 2018Edition: Second edition.Description: 1 online resource (202 pages) : 93 illustrations.ISBN: 9781315106373.Subject(s): COMPUTERS / Security / General | COMPUTERS / Computer Engineering | Mobile communication systems -- Security measures | Wireless communication systems -- Security measures | Wireless LANs -- Security measuresAdditional physical formats: Print version: : No titleDDC classification: 005.8 Online resources: Click here to view.
Contents:
chapter 1 Introduction -- chapter 2 Network Security -- chapter 3 WLAN -- chapter 4 Mobile Phones -- chapter 5 Bluetooth -- chapter 6 Infra Red -- chapter 7 Near Field Communication [102] -- chapter 8 Security Policy -- chapter 9 Emergency Management in Communication Networks -- chapter 10 References.
Abstract: Wireless communications have become indispensable part of our lives. The book deals with the security of such wireless communication. The technological background of these applications have been presented in detail. Special emphasis has been laid on the IEEE 802.11x-standards that have been developed for this technology. A major part of the book is devoted to security risks, encryption and authentication. Checklists have been provided to help IT administrators and security officers to achieve the maximum possible security in their installations, when using wireless technology.
    average rating: 0.0 (0 votes)
No physical items for this record

chapter 1 Introduction -- chapter 2 Network Security -- chapter 3 WLAN -- chapter 4 Mobile Phones -- chapter 5 Bluetooth -- chapter 6 Infra Red -- chapter 7 Near Field Communication [102] -- chapter 8 Security Policy -- chapter 9 Emergency Management in Communication Networks -- chapter 10 References.

Wireless communications have become indispensable part of our lives. The book deals with the security of such wireless communication. The technological background of these applications have been presented in detail. Special emphasis has been laid on the IEEE 802.11x-standards that have been developed for this technology. A major part of the book is devoted to security risks, encryption and authentication. Checklists have been provided to help IT administrators and security officers to achieve the maximum possible security in their installations, when using wireless technology.

There are no comments for this item.

Log in to your account to post a comment.