Guide to Wireless Network Security - John R. Vacca

Guide to Wireless Network Security

By: John R. Vacca

Paperback | 23 August 2016

At a Glance

Paperback


$310.47

or 4 interest-free payments of $77.62 with

 or 

Aims to ship in 7 to 10 business days

1. INTRODUCTION With the increasing deployment of wireless networks (802. 11 architecture) in enterprise environments, IT enterprises are working to implement security mechanisms that are equivalent to those existing today for wire-based networks. An important aspect of this is the need to provide secure access to the network for valid users. Existing wired network jacks are located inside buildings already secured from unauthorized access through the use of keys, badge access, and so forth. A user must gain physical access to the building in order to plug a client computer into a network jack. In contrast, a wireless access point (AP) may be accessed from off the premises if the signal is detectable (for instance, from a parking lot adjacent to the building). Thus, wireless networks require secure access to the AP and the ability to isolate the AP from the internal private network prior to user authentication into the network domain. Furthermore, as enterprises strive to provide better availability of mission-critical wireless data, they also face the challenge of maintaining that data's security and integrity. While each connection with a client, a supplier or a enterprise partner can improve responsiveness and efficiency, it also increases the vulnerability of enterprise wireless data to attack. In such an environment, wireless network security is becoming more important every day. Also, with the growing reliance on e-commerce, wireless network-based services and the Internet, enterprises are faced with an ever-increasing responsibility to protect their systems from attack.

More in Network Hardware

Applied Embedded Electronics : Design Essentials for Robust Systems - Jerry Twomey
UNIX in a Nutshell : In a Nutshell (O'Reilly) - Arnold Robbins

RRP $85.50

$43.75

49%
OFF
Designing Embedded Hardware 2e : O'Reilly Ser. - John Catsoulis

RRP $95.00

$43.25

54%
OFF
Cisco IOS in a Nutshell : In a Nutshell (O'Reilly) - James Boney
JUNOS Cookbook : Cookbooks (O'Reilly) - Aviva Garrett

RRP $104.50

$51.75

50%
OFF
CEH Certified Ethical Hacker Bundle, Fourth Edition - Matt Walker
Getting Started with Netduino : OREILLY - Chris Walker

RRP $38.00

$21.40

44%
OFF
JUNOS Enterprise Switching : OREILLY - Harry Reynolds

RRP $133.00

$64.50

52%
OFF
Getting Started with Bluetooth Low Energy - Carles Cufi Akiba

RRP $85.50

$43.75

49%
OFF
Juniper QFX5100 Series - Douglas Richard, Jr. Hanks

RRP $114.00

$55.50

51%
OFF
Ethernet Switches - Charles Spurgeon

RRP $24.75

$15.25

38%
OFF
Practical Monitoring : Effective Strategies for the Real World - Mike Julian