大学図書館所蔵 件 / 全2件
Get full details on major mobile/wireless clients and operating systems--including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security -- the most trusted name in e-security -- this is your one-stop guide to wireless security.
Part 1: Introduction to Wireless 1: Welcome to a Wireless World 2: Wireless Threats 3: Introduction to Wireless Security Protocols and Cryptography 4: Security Considerations for Wireless Devices Part 2: Wireless Technologies and Applications 5: Introduction to Cellular Networks 6: Introduction to Wireless Data Networks 7: Wireless Standards and Technologies Part 3: Wireless Deployment Strategies 8: Implementing Wireless LANs: Security Considerations 9: Enabling Secure Wireless Access to Data 10: Real Examples from the Wireless World 11: The Wireless Future 12: Assessing Wireless Local Area Networks (LANs) Appendix A: Glossary of Wireless Terms
「Nielsen BookData」 より