Average Reviews:
(More customer reviews)I have to admit I was very naive about wireless security, hence the need to educate myself. The problem is there is so much noise out there, misleading, conflicting or confusing information regarding the topic. This was the first book I was able to really walk away from feeling very comfortable that I covered the most important angles.
Right off the bat I was happy to find that it's very "vendor agnostic", not focusing on tools or techniques that are unique to certain commercial systems. The pace of the book is good, first walking you through the basics of wireless network security, then moving into the components of network security then how they relate to wireless networks. It's also nice that they have an entire chapter dedicated to integrating wireless access into an existing network - something most of us are needing to do these days. Lastly, it covers a variety of differing security models. These become very helpful because you can use them as a basis for cumstomizing your own wireless security system.
Overall, if you're a network security professional looking for a good solid foundation in how it pertains to wireless networks, this a great book to have around.
Click Here to see more reviews about: Wireless Security End to End
Wireless Security End to End is a comprehensive guide covering encryption, PKI, SSL, third party certificate validation, Smart card, pin authentication, device level security, threat analysis, strategies for developing a wireless security solution and a look ahead at future biometric technology all in the End to End series targeted at real-world professionals.Wireless Security End to End is being done in the End to End series, a new series dedicated to cutting-edge technologies designed to provide proven solutions, real-world tips and best practices. The End to End series takes a no "techno-babble" modular approach in explaining cutting edge wireless technology. Special features include case studies, real-life implementations and wireless decision tree.
Click here for more information about Wireless Security End to End
0 comments:
Post a Comment