skip to content
Wireless operational security Preview this item
ClosePreview this item
Checking...

Wireless operational security

Author: John W Rittinghouse; James F Ransome
Publisher: Burlington, MA : Digital Press, ©2004.
Edition/Format:   Print book : EnglishView all editions and formats
Summary:
This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Additional Physical Format: Online version:
Rittinghouse, John W.
Wireless operational security.
Burlington, MA : Digital Press, ©2004
(OCoLC)607139269
Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: John W Rittinghouse; James F Ransome
ISBN: 1555583172 9781555583170
OCLC Number: 54831240
Notes: Includes index.
Description: xxvi, 468 pages : illustrations ; 24 cm
Contents: 1. Basic concepts --
2. Managing access --
3. Setting up defenses --
4. Incident management --
5. Securing Web applications --
6. Security and the law --
7. Wireless networking basics --
8. WLAN policy and risk management --
9. WLAN intrusion process --
10. WLAN risk and threat mitigation --
11. Additional WLAN security solutions --
12. Wisdom for WLAN practitioners --
A. Wireless policy essentials --
B. Wireless-related legislative links --
C. Additional WLAN references.
Responsibility: John W. Rittinghouse, James F. Ransome.
More information:

Abstract:

Addresses the operational and day-to-day security management requirements of 21st century companies. This comprehensive wireless network book presents a 'WISDOM' model for Wireless Security  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/54831240> # Wireless operational security
    a schema:Book, schema:CreativeWork ;
   library:oclcnum "54831240" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mau> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1045977#Place/burlington_ma> ; # Burlington, MA
   schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
   schema:about <http://dewey.info/class/005.8/e22/> ;
   schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
   schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
   schema:bookFormat bgn:PrintBook ;
   schema:contributor <http://viaf.org/viaf/2176121> ; # James F. Ransome
   schema:copyrightYear "2004" ;
   schema:creator <http://viaf.org/viaf/19051716> ; # John W. Rittinghouse
   schema:datePublished "2004" ;
   schema:description "This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired network and the wireless subnet is not separated from the wired subnet. There are approximately a dozen popular books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for wireless security, none of which address them in a practical, operationally-oriented and comprehensive way. Wireless Operational Security bridges this gap. *Presents a new "WISDOM" model for Wireless Security Infrastructures *Acts as a critical guide to implementing "Converged Networks" wired/wireless with all necessary security considerations *Rittinghouse's Cybersecurity Operations Handbook is the only security book recommended by the FCC."@en ;
   schema:description "1. Basic concepts -- 2. Managing access -- 3. Setting up defenses -- 4. Incident management -- 5. Securing Web applications -- 6. Security and the law -- 7. Wireless networking basics -- 8. WLAN policy and risk management -- 9. WLAN intrusion process -- 10. WLAN risk and threat mitigation -- 11. Additional WLAN security solutions -- 12. Wisdom for WLAN practitioners -- A. Wireless policy essentials -- B. Wireless-related legislative links -- C. Additional WLAN references."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/1045977> ;
   schema:inLanguage "en" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/607139269> ;
   schema:name "Wireless operational security"@en ;
   schema:productID "54831240" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/54831240#PublicationEvent/burlington_ma_digital_press_2004> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/1045977#Agent/digital_press> ; # Digital Press
   schema:url <http://libaccess.mcmaster.ca/login?url=http://catdir.loc.gov/catdir/description/els051/2004298581.html> ;
   schema:workExample <http://worldcat.org/isbn/9781555583170> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/54831240> ;
    .


Related Entities

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
   schema:name "Computer security"@en ;
    .

<http://viaf.org/viaf/19051716> # John W. Rittinghouse
    a schema:Person ;
   schema:familyName "Rittinghouse" ;
   schema:givenName "John W." ;
   schema:name "John W. Rittinghouse" ;
    .

<http://viaf.org/viaf/2176121> # James F. Ransome
    a schema:Person ;
   schema:familyName "Ransome" ;
   schema:givenName "James F." ;
   schema:name "James F. Ransome" ;
    .

<http://worldcat.org/isbn/9781555583170>
    a schema:ProductModel ;
   schema:isbn "1555583172" ;
   schema:isbn "9781555583170" ;
    .

<http://www.worldcat.org/oclc/607139269>
    a schema:CreativeWork ;
   rdfs:label "Wireless operational security." ;
   schema:description "Online version:" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/54831240> ; # Wireless operational security
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.