Wireless Security Architecture

Designing and Maintaining Secure Wireless for Enterprise



Bookstore > Books > Wireless Security Architecture

Price$37.74 - $42.44
Rating
AuthorsJennifer Minella, Stephen Orr
PublisherWiley
Published2022
Pages624
LanguageEnglish
FormatPaper book / ebook (PDF)
ISBN-101119883059
ISBN-139781119883050
EBook Hardcover Paperback

Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint to a resilient and compliant architecture that responds to regulatory requirements, reduces organizational risk, and conforms to industry best practices. This book emphasizes WiFi security, as well as guidance on private cellular and Internet of Things security.

Readers will discover how to move beyond isolated technical certifications and vendor training and put together a coherent network that responds to contemporary security risks. It offers up-to-date coverage - including data published for the first time - of new WPA3 security, Wi-Fi 6E, zero-trust frameworks, and other emerging trends. It also includes: Concrete strategies suitable for organizations of all sizes, from large government agencies to small public and private companies; Effective technical resources and real-world sample architectures; Explorations of the relationships between security, wireless, and network elements; Practical planning templates, guides, and real-world case studies demonstrating application of the included concepts.

Perfect for network, wireless, and enterprise security architects, Wireless Security Architecture belongs in the libraries of technical leaders in firms of all sizes and in any industry seeking to build a secure wireless network.




5 5 2

Similar Books


Android Security Internals

Android Security Internals

by Nikolay Elenkov

There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals - until now.In Android Security Internals, top Android security expert Nikolay Elenkov takes us under t...

Price:  $23.99  |  Publisher:  No Starch Press  |  Release:  2014

Hacking Exposed Wireless, 2nd Edition

Hacking Exposed Wireless, 2nd Edition

by Johnny Cache, Joshua Wright, Vincent Liu

Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily available and custom tools to target, infiltrate, and...

Price:  $3.99  |  Publisher:  McGraw-Hill  |  Release:  2010

Mastering Wireless Penetration Testing for Highly Secured Environments

Mastering Wireless Penetration Testing for Highly Secured Environments

by Aaron Johns

Penetration testing is a tool for testing computer systems, networks, or web applications to find vulnerabilities that an attacker could exploit. By performing a penetration test, you can proactively identify which vulnerabilities are most critical. This allows your organization to more intelligently prioritize remediation and apply neces...

Price:  $44.99  |  Publisher:  Packt Publishing  |  Release:  2015

Network Security Auditing

Network Security Auditing

by Chris Jackson

This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them.Cisco network security expert Chris Jackson begins with a thorough overview of the auditing process, including coverage of the latest regulations, com...

Price:  $54.99  |  Publisher:  Cisco Press  |  Release:  2010

Practical Internet of Things Security, 2nd Edition

Practical Internet of Things Security, 2nd Edition

by Brian Russell, Drew Van Duren

With the advent of the Internet of Things (IoT),businesses have to defend against new types of threat. The business ecosystem now includes the cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces, a desire to share information with many stakeholders, and a need to take action quickly based on large q...

Price:  $35.90  |  Publisher:  Packt Publishing  |  Release:  2018

Beginning Ethical Hacking with Kali Linux

Beginning Ethical Hacking with Kali Linux

by Sanjib Sinha

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you'll move on to an introduction to...

Price:  $32.60  |  Publisher:  Apress  |  Release:  2018

Learning Kali Linux

Learning Kali Linux

by Ric Messier

With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali's expansive security capabilities and helps you identify the ...

Price:  $35.78  |  Publisher:  O'Reilly Media  |  Release:  2018

Android Hacker's Handbook

Android Hacker's Handbook

by Joshua J. Drake, Zach Lanier, Collin Mulliner, Pau Oliva Fora, Stephen A. Ridley, Georg Wicherski

As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detaile...

Price:  $12.00  |  Publisher:  Wiley  |  Release:  2014