EUR 48,75
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloCondizione: New. pp. 874 Illus.
EUR 53,03
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloCondizione: New. pp. 874.
EUR 53,35
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloCondizione: New. pp. 874.
EUR 87,69
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service.
EUR 87,69
Convertire valutaQuantità: 5 disponibili
Aggiungi al carrelloCondizione: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
EUR 91,56
Convertire valutaQuantità: 5 disponibili
Aggiungi al carrelloCondizione: New. Brand New Original US Edition. Customer service! Satisfaction Guaranteed.
EUR 95,43
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloBrand new book. Fast ship. Please provide full street address as we are not able to ship to P O box address.
EUR 99,56
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloCondizione: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
EUR 108,31
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloBrand new book. Fast ship. Please provide full street address as we are not able to ship to P O box address.
EUR 111,73
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrellohardcover. Condizione: New. In shrink wrap. Looks like an interesting title!
Editore: Springer-Verlag New York Inc., 2006
ISBN 10: 0387954252 ISBN 13: 9780387954257
Lingua: Inglese
Da: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlanda
EUR 131,51
Convertire valutaQuantità: 15 disponibili
Aggiungi al carrelloCondizione: New. With the rapid deployment of wireless networks in business environments, IT professionals must implement security mechanisms that are equivalent to those for wire-based networks. This is a guide to key foundation topics and technology frameworks for designing and maintaining secure, reliable operations. Num Pages: 848 pages, biography. BIC Classification: GTC; KNTX; UKR; UT. Category: (G) General (US: Trade); (P) Professional & Vocational; (UP) Postgraduate, Research & Scholarly; (UU) Undergraduate. Dimension: 254 x 178 x 46. Weight in Grams: 3780. . 2006. Hardback. . . . .
Editore: Springer-Verlag New York Inc., 2006
ISBN 10: 0387954252 ISBN 13: 9780387954257
Lingua: Inglese
Da: Kennys Bookstore, Olney, MD, U.S.A.
EUR 137,67
Convertire valutaQuantità: 15 disponibili
Aggiungi al carrelloCondizione: New. With the rapid deployment of wireless networks in business environments, IT professionals must implement security mechanisms that are equivalent to those for wire-based networks. This is a guide to key foundation topics and technology frameworks for designing and maintaining secure, reliable operations. Num Pages: 848 pages, biography. BIC Classification: GTC; KNTX; UKR; UT. Category: (G) General (US: Trade); (P) Professional & Vocational; (UP) Postgraduate, Research & Scholarly; (UU) Undergraduate. Dimension: 254 x 178 x 46. Weight in Grams: 3780. . 2006. Hardback. . . . . Books ship from the US and Ireland.
EUR 148,49
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloCondizione: New. SUPER FAST SHIPPING.
EUR 148,49
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloCondizione: New. SUPER FAST SHIPPING.
EUR 159,44
Convertire valutaQuantità: 15 disponibili
Aggiungi al carrelloCondizione: New.
EUR 158,26
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
EUR 158,45
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
EUR 164,47
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
EUR 178,81
Convertire valutaQuantità: 15 disponibili
Aggiungi al carrelloCondizione: New.
Editore: Springer-Verlag New York Inc., New York, 2016
ISBN 10: 1489977120 ISBN 13: 9781489977120
Lingua: Inglese
Da: Grand Eagle Retail, Mason, OH, U.S.A.
EUR 181,14
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: new. Paperback. 1. INTRODUCTION With the increasing deployment of wireless networks (802. 11 architecture) in enterprise environments, IT enterprises are working to implement security mechanisms that are equivalent to those existing today for wire-based networks. An important aspect of this is the need to provide secure access to the network for valid users. Existing wired network jacks are located inside buildings already secured from unauthorized access through the use of keys, badge access, and so forth. A user must gain physical access to the building in order to plug a client computer into a network jack. In contrast, a wireless access point (AP) may be accessed from off the premises if the signal is detectable (for instance, from a parking lot adjacent to the building). Thus, wireless networks require secure access to the AP and the ability to isolate the AP from the internal private network prior to user authentication into the network domain. Furthermore, as enterprises strive to provide better availability of mission-critical wireless data, they also face the challenge of maintaining that data's security and integrity. While each connection with a client, a supplier or a enterprise partner can improve responsiveness and efficiency, it also increases the vulnerability of enterprise wireless data to attack. In such an environment, wireless network security is becoming more important every day. Also, with the growing reliance on e-commerce, wireless network-based services and the Internet, enterprises are faced with an ever-increasing responsibility to protect their systems from attack. Existing wired network jacks are located inside buildings already secured from unauthorized access through the use of keys, badge access, and so forth. Thus, wireless networks require secure access to the AP and the ability to isolate the AP from the internal private network prior to user authentication into the network domain. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Editore: Springer-Verlag New York Inc., New York, NY, 2006
ISBN 10: 0387954252 ISBN 13: 9780387954257
Lingua: Inglese
Da: Grand Eagle Retail, Mason, OH, U.S.A.
EUR 185,56
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloHardcover. Condizione: new. Hardcover. Here is an authoritative, clearly presented guide to key foundation topics and technology frameworks for designing and maintaining secure, reliable operations. From basic concepts to designing principles to deployment, all critical concepts and phases are clearly explained and presented. Includes coverage of wireless security testing techniques and prevention techniques for intrusion (attacks). It is an essential resource for wireless network administrators and developers. Existing wired network jacks are located inside buildings already secured from unauthorized access through the use of keys, badge access, and so forth. Thus, wireless networks require secure access to the AP and the ability to isolate the AP from the internal private network prior to user authentication into the network domain. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
EUR 185,37
Convertire valutaQuantità: 15 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
EUR 185,67
Convertire valutaQuantità: 15 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Editore: Springer, 2006
Lingua: Inglese
Da: Books in my Basket, New Delhi, India
EUR 168,46
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloHardcover. Condizione: New. ISBN:9780387954257.
EUR 178,14
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. Provides up-to-date perspective on security threatsHands-on reference for practitioners and advanced-level studentsPredictions for network architecturesA major, comprehensive professional text/reference for designing and maintain.
Da: UK BOOKS STORE, London, LONDO, Regno Unito
EUR 236,12
Convertire valutaQuantità: 20 disponibili
Aggiungi al carrelloHardcover. Condizione: New. Brand New! Fast Delivery This is an International Edition and ship within 24-48 hours. Deliver by FedEx and Dhl, & Aramex, UPS, & USPS and we do accept APO and PO BOX Addresses. Order can be delivered worldwide within 7-11 days and we do have flat rate for up to 2LB. Extra shipping charges will be requested if the Book weight is more than 5 LB. This Item May be shipped from India, United states & United Kingdom. Depending on your location and availability.
Editore: Springer US, Springer New York, 2016
ISBN 10: 1489977120 ISBN 13: 9781489977120
Lingua: Inglese
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 168,53
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - 1. INTRODUCTION With the increasing deployment of wireless networks (802. 11 architecture) in enterprise environments, IT enterprises are working to implement security mechanisms that are equivalent to those existing today for wire-based networks. An important aspect of this is the need to provide secure access to the network for valid users. Existing wired network jacks are located inside buildings already secured from unauthorized access through the use of keys, badge access, and so forth. A user must gain physical access to the building in order to plug a client computer into a network jack. In contrast, a wireless access point (AP) may be accessed from off the premises if the signal is detectable (for instance, from a parking lot adjacent to the building). Thus, wireless networks require secure access to the AP and the ability to isolate the AP from the internal private network prior to user authentication into the network domain. Furthermore, as enterprises strive to provide better availability of mission-critical wireless data, they also face the challenge of maintaining that data's security and integrity. While each connection with a client, a supplier or a enterprise partner can improve responsiveness and efficiency, it also increases the vulnerability of enterprise wireless data to attack. In such an environment, wireless network security is becoming more important every day. Also, with the growing reliance on e-commerce, wireless network-based services and the Internet, enterprises are faced with an ever-increasing responsibility to protect their systems from attack.
EUR 229,29
Convertire valutaQuantità: 15 disponibili
Aggiungi al carrelloCondizione: New.
Editore: Springer-Verlag New York Inc, 2016
ISBN 10: 1489977120 ISBN 13: 9781489977120
Lingua: Inglese
Da: Revaluation Books, Exeter, Regno Unito
EUR 243,32
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. reprint edition. 871 pages. 10.00x7.01x1.77 inches. In Stock.
EUR 248,08
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloHardcover. Condizione: Like New. Like New. book.