×







We sell 100% Genuine & New Books only!

Wireless Operational Security at Meripustak

Wireless Operational Security by John CISM PhD Rittinghouse , James F. CISSP CISM PhD Ransome, ELSEVIER SCIENCE & TECHNOLOGY

Books from same Author: John CISM PhD Rittinghouse , James F. CISSP CISM PhD Ransome

Books from same Publisher: ELSEVIER SCIENCE & TECHNOLOGY

Related Category: Author List / Publisher List


  • Price: ₹ 8539.00/- [ 20.00% off ]

    Seller Price: ₹ 6832.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)John CISM PhD Rittinghouse , James F. CISSP CISM PhD Ransome
    PublisherELSEVIER SCIENCE & TECHNOLOGY
    ISBN9781555583170
    Pages468
    BindingPaperback 
    LanguageEnglish
    Publish YearMay 2004

    Description

    ELSEVIER SCIENCE & TECHNOLOGY Wireless Operational Security by John CISM PhD Rittinghouse , James F. CISSP CISM PhD Ransome

    This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired network and the wireless subnet is not separated from the wired subnet. There are approximately a dozen popular books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for wireless security, none of which address them in a practical, operationally-oriented and comprehensive way. Wireless Operational Security bridges this gap.



    Book Successfully Added To Your Cart