Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Rockland, Mass.
Syngress
2006
|
Series: | How to Cheat Ser
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781597490870/?ar |
Summary: | Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless network With the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the networks vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users. A practical product and technology specific guideline to securing a wireless networks for the busy System Administrator Takes a simplified multi-layered approach into easily deployed plans for a straight forward understanding Does not bog you down with history, but offers practical useful information for today. |
Item Description: | Includes index. - Print version record |
Physical Description: | 1 Online-Ressource (xxv, 453 pages) illustrations. |
ISBN: | 1429416599 9781429416597 9780080508221 0080508227 9781597490870 1597490873 1281078336 9781281078339 9786611078331 6611078339 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-05658217X | ||
003 | DE-627-1 | ||
005 | 20240228114045.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200916s2006 xx |||||o 00| ||eng c | ||
020 | |a 1429416599 |c electronic bk. |9 1-4294-1659-9 | ||
020 | |a 9781429416597 |c electronic bk. |9 978-1-4294-1659-7 | ||
020 | |a 9780080508221 |c electronic bk. |9 978-0-08-050822-1 | ||
020 | |a 0080508227 |c electronic bk. |9 0-08-050822-7 | ||
020 | |a 9781597490870 |9 978-1-59749-087-0 | ||
020 | |a 1597490873 |9 1-59749-087-3 | ||
020 | |a 1281078336 |9 1-281-07833-6 | ||
020 | |a 9781281078339 |9 978-1-281-07833-9 | ||
020 | |a 9786611078331 |9 9786611078331 | ||
020 | |a 6611078339 |9 6611078339 | ||
035 | |a (DE-627-1)05658217X | ||
035 | |a (DE-599)KEP05658217X | ||
035 | |a (ORHE)9781597490870 | ||
035 | |a (DE-627-1)05658217X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a UTN |2 bicssc | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Hurley, Chris |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a How to cheat at securing a wireless network |c Chris Hurley [and others] |
264 | 1 | |a Rockland, Mass. |b Syngress |c 2006 | |
300 | |a 1 Online-Ressource (xxv, 453 pages) |b illustrations. | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a How to Cheat Ser | |
500 | |a Includes index. - Print version record | ||
520 | |a Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless network With the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the networks vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users. A practical product and technology specific guideline to securing a wireless networks for the busy System Administrator Takes a simplified multi-layered approach into easily deployed plans for a straight forward understanding Does not bog you down with history, but offers practical useful information for today. | ||
546 | |a English. | ||
650 | 0 | |a Wireless LANs |x Security measures | |
650 | 4 | |a Réseaux locaux sans fil ; Sécurité ; Mesures | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Wireless LANs ; Security measures | |
650 | 4 | |a handbooks | |
650 | 4 | |a manuals (instructional materials) | |
650 | 4 | |a Handbooks and manuals | |
650 | 4 | |a Handbooks and manuals | |
650 | 4 | |a Guides et manuels | |
776 | 1 | |z 1597490873 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1597490873 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597490870/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-05658217X |
---|---|
_version_ | 1835903154868191232 |
adam_text | |
any_adam_object | |
author | Hurley, Chris |
author_facet | Hurley, Chris |
author_role | aut |
author_sort | Hurley, Chris |
author_variant | c h ch |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)05658217X (DE-599)KEP05658217X (ORHE)9781597490870 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03419cam a22006732c 4500</leader><controlfield tag="001">ZDB-30-ORH-05658217X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114045.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200916s2006 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1429416599</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4294-1659-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781429416597</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4294-1659-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080508221</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-050822-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080508227</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-050822-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490870</subfield><subfield code="9">978-1-59749-087-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490873</subfield><subfield code="9">1-59749-087-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281078336</subfield><subfield code="9">1-281-07833-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281078339</subfield><subfield code="9">978-1-281-07833-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611078331</subfield><subfield code="9">9786611078331</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611078339</subfield><subfield code="9">6611078339</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)05658217X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP05658217X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597490870</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)05658217X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UTN</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hurley, Chris</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">How to cheat at securing a wireless network</subfield><subfield code="c">Chris Hurley [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="b">Syngress</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxv, 453 pages)</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">How to Cheat Ser</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless network With the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the networks vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users. A practical product and technology specific guideline to securing a wireless networks for the busy System Administrator Takes a simplified multi-layered approach into easily deployed plans for a straight forward understanding Does not bog you down with history, but offers practical useful information for today.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Wireless LANs</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux locaux sans fil ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless LANs ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">handbooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">manuals (instructional materials)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Handbooks and manuals</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Handbooks and manuals</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Guides et manuels</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1597490873</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1597490873</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597490870/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-05658217X |
illustrated | Illustrated |
indexdate | 2025-06-25T12:14:46Z |
institution | BVB |
isbn | 1429416599 9781429416597 9780080508221 0080508227 9781597490870 1597490873 1281078336 9781281078339 9786611078331 6611078339 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxv, 453 pages) illustrations. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Syngress |
record_format | marc |
series2 | How to Cheat Ser |
spelling | Hurley, Chris VerfasserIn aut How to cheat at securing a wireless network Chris Hurley [and others] Rockland, Mass. Syngress 2006 1 Online-Ressource (xxv, 453 pages) illustrations. Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier How to Cheat Ser Includes index. - Print version record Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless network With the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the networks vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users. A practical product and technology specific guideline to securing a wireless networks for the busy System Administrator Takes a simplified multi-layered approach into easily deployed plans for a straight forward understanding Does not bog you down with history, but offers practical useful information for today. English. Wireless LANs Security measures Réseaux locaux sans fil ; Sécurité ; Mesures COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Wireless LANs ; Security measures handbooks manuals (instructional materials) Handbooks and manuals Guides et manuels 1597490873 Erscheint auch als Druck-Ausgabe 1597490873 |
spellingShingle | Hurley, Chris How to cheat at securing a wireless network Wireless LANs Security measures Réseaux locaux sans fil ; Sécurité ; Mesures COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Wireless LANs ; Security measures handbooks manuals (instructional materials) Handbooks and manuals Guides et manuels |
title | How to cheat at securing a wireless network |
title_auth | How to cheat at securing a wireless network |
title_exact_search | How to cheat at securing a wireless network |
title_full | How to cheat at securing a wireless network Chris Hurley [and others] |
title_fullStr | How to cheat at securing a wireless network Chris Hurley [and others] |
title_full_unstemmed | How to cheat at securing a wireless network Chris Hurley [and others] |
title_short | How to cheat at securing a wireless network |
title_sort | how to cheat at securing a wireless network |
topic | Wireless LANs Security measures Réseaux locaux sans fil ; Sécurité ; Mesures COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Wireless LANs ; Security measures handbooks manuals (instructional materials) Handbooks and manuals Guides et manuels |
topic_facet | Wireless LANs Security measures Réseaux locaux sans fil ; Sécurité ; Mesures COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Wireless LANs ; Security measures handbooks manuals (instructional materials) Handbooks and manuals Guides et manuels |
work_keys_str_mv | AT hurleychris howtocheatatsecuringawirelessnetwork |