Wireless Security Architecture
Designing and Maintaining Secure Wireless for Enterprise
|Price||$37.74 - $42.44
|Authors||Jennifer Minella, Stephen Orr|
|Format||Paper book / ebook (PDF)|
Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint to a resilient and compliant architecture that responds to regulatory requirements, reduces organizational risk, and conforms to industry best practices. This book emphasizes WiFi security, as well as guidance on private cellular and Internet of Things security.
Readers will discover how to move beyond isolated technical certifications and vendor training and put together a coherent network that responds to contemporary security risks. It offers up-to-date coverage - including data published for the first time - of new WPA3 security, Wi-Fi 6E, zero-trust frameworks, and other emerging trends. It also includes: Concrete strategies suitable for organizations of all sizes, from large government agencies to small public and private companies; Effective technical resources and real-world sample architectures; Explorations of the relationships between security, wireless, and network elements; Practical planning templates, guides, and real-world case studies demonstrating application of the included concepts.
Perfect for network, wireless, and enterprise security architects, Wireless Security Architecture belongs in the libraries of technical leaders in firms of all sizes and in any industry seeking to build a secure wireless network.
5 5 2
by Nikolay Elenkov
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals - until now.In Android Security Internals, top Android security expert Nikolay Elenkov takes us under t...
Price: $23.99 | Publisher: No Starch Press | Release: 2014
by Johnny Cache, Joshua Wright, Vincent Liu
Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily available and custom tools to target, infiltrate, and...
Price: $3.99 | Publisher: McGraw-Hill | Release: 2010
by Aaron Johns
Penetration testing is a tool for testing computer systems, networks, or web applications to find vulnerabilities that an attacker could exploit. By performing a penetration test, you can proactively identify which vulnerabilities are most critical. This allows your organization to more intelligently prioritize remediation and apply neces...
Price: $26.99 | Publisher: Packt Publishing | Release: 2015
by Brian Russell, Drew Van Duren
With the advent of the Internet of Things (IoT),businesses have to defend against new types of threat. The business ecosystem now includes the cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces, a desire to share information with many stakeholders, and a need to take action quickly based on large q...
Price: $35.90 | Publisher: Packt Publishing | Release: 2018
by Sanjib Sinha
Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you'll move on to an introduction to...
Price: $32.60 | Publisher: Apress | Release: 2018
by Ric Messier
With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali's expansive security capabilities and helps you identify the ...
Price: $35.78 | Publisher: O'Reilly Media | Release: 2018
by Chris Jackson
This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them.Cisco network security expert Chris Jackson begins with a thorough overview of the auditing process, including coverage of the latest regulations, com...
Price: $54.99 | Publisher: Cisco Press | Release: 2010
by Joshua J. Drake, Zach Lanier, Collin Mulliner, Pau Oliva Fora, Stephen A. Ridley, Georg Wicherski
As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detaile...
Price: $12.00 | Publisher: Wiley | Release: 2014