CWSP guide to wireless security
"CWSP Guide to Wireless Security is a hands-on guide to defending wireless networks against attacks. This book prepares students for the Certified Wireless Security Professional (CWSP) certification from Planet3. Focusing on IEEE 802.11a/b/g/pre-n wireless local area networks, this book provide...
Saved in:
| Format: | Book |
|---|---|
| Language: | English |
| Published: |
Boston, MA
Thomson Course Technology
2007
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Wireless network security a beginner's guide
by: Wrightson, Tyler
Published: (2012)
by: Wrightson, Tyler
Published: (2012)
Security for wireless ad hoc networks
by: Anjum, Farooq
Published: (2007)
by: Anjum, Farooq
Published: (2007)
Hacking exposed wireless wireless security secrets & solutions /
by: Cache, Johnny
Published: (2007)
by: Cache, Johnny
Published: (2007)
Hacking exposed wireless wireless security secrets & solutions
by: Cache, Johnny
Published: (2010)
by: Cache, Johnny
Published: (2010)
Hacking exposed wireless wireless security secrets & solutions
by: Wright, Joshua, et al.
Published: (2015)
by: Wright, Joshua, et al.
Published: (2015)
Security in wireless LANs and MANs
by: Hardjono
Published: (2005)
by: Hardjono
Published: (2005)
SonicWALL secure wireless network integrated solutions guide
by: Tran, Khai
Published: (2008)
by: Tran, Khai
Published: (2008)
Guide to wireless network security
by: Vacca, John R.
Published: (2006)
by: Vacca, John R.
Published: (2006)
Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing
by: Buttyan, Levente
Published: (2008)
by: Buttyan, Levente
Published: (2008)
Wireless networks and security issues, challenges and research trends
Published: (2013)
Published: (2013)
Wireless communications security
by: Imai
Published: (2005)
by: Imai
Published: (2005)
Wireless communications security
by: Imai 1943-
Published: (2006)
by: Imai 1943-
Published: (2006)
Wireless communications security
by: Imai
Published: (2005)
by: Imai
Published: (2005)
Security in wireless mesh networks
Published: (2009)
Published: (2009)
Security for mobile networks and platforms
by: Aissi
Published: (2006)
by: Aissi
Published: (2006)
CWSP certified wireless security professional official study guide (CWSP-205)
by: Bartz, Robert
Published: (2016)
by: Bartz, Robert
Published: (2016)
Wireless security and cryptography specifications and implementations
Published: (2007)
Published: (2007)
Fundamentals of wireless networking
by: Price
Published: (2007)
by: Price
Published: (2007)
Wireless Internet security architecture and protocols
by: Kempf, James 1952-
Published: (2008)
by: Kempf, James 1952-
Published: (2008)
Wireless networks multiuser detection in cross-layer design
by: Comaniciu
Published: (2005)
by: Comaniciu
Published: (2005)
A comprehensive guide to 5G security
Published: (2018)
Published: (2018)
Security in an IPv6 environment
by: Minoli, Daniel 1952-
Published: (2009)
by: Minoli, Daniel 1952-
Published: (2009)
Security and data reliability in cooperative wireless networks
by: Hassan, Emad S.
Published: (2018)
by: Hassan, Emad S.
Published: (2018)
Wireless communications and networks
by: Stallings, William
Published: (2005)
by: Stallings, William
Published: (2005)
Wireless communications and networks
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Wireless communication networks and systems
by: Beard, Cory, et al.
Published: (2016)
by: Beard, Cory, et al.
Published: (2016)
Honeypots a new paradigm to information security
by: Joshi, R.C
Published: (2011)
by: Joshi, R.C
Published: (2011)
Management of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
Internet security you can afford using Untangle as your internet gateway
by: Dawson, Christopher
Published: (2015)
by: Dawson, Christopher
Published: (2015)
Topology control in wireless sensor networks with a companion simulation tool for teaching and research
by: Labrador, Miguel A.
Published: (2009)
by: Labrador, Miguel A.
Published: (2009)
Securing systems applied security architecture and threat models
by: Schoenfield, Brook S. E.
Published: (2015)
by: Schoenfield, Brook S. E.
Published: (2015)
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2012)
by: Whitman, Michael E., et al.
Published: (2012)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
Applied network security master the art of detecting and averting advanced network security attacks and techniques
by: Salmon, Arthur, et al.
Published: (2017)
by: Salmon, Arthur, et al.
Published: (2017)
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide /
by: Chapple, Mike, et al.
Published: (2024)
by: Chapple, Mike, et al.
Published: (2024)
Network security how to plan for it and achieve it
by: Baker
Published: (1995)
by: Baker
Published: (1995)
Network security architectures
by: Convery, Sean
Published: (2012)
by: Convery, Sean
Published: (2012)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2022)
by: Whitman, Michael E., et al.
Published: (2022)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2016)
by: Whitman, Michael E., et al.
Published: (2016)
Similar Items
-
Wireless network security a beginner's guide
by: Wrightson, Tyler
Published: (2012) -
Security for wireless ad hoc networks
by: Anjum, Farooq
Published: (2007) -
Hacking exposed wireless wireless security secrets & solutions /
by: Cache, Johnny
Published: (2007) -
Hacking exposed wireless wireless security secrets & solutions
by: Cache, Johnny
Published: (2010) -
Hacking exposed wireless wireless security secrets & solutions
by: Wright, Joshua, et al.
Published: (2015)


