SonicWALL secure wireless network : integrated solutions guide /
Nearly forty percent of the world's 1 billion+ Internet users are wireless. It's a truly staggering fact to think that the majority of these wireless implementations are fundamentally insecure, leaving users and private data at risk. Many wireless proprietors think that the convenience of...
Saved in:
Corporate Authors: | |
---|---|
Group Author: | |
Published: |
Syngress,
|
Publisher Address: | Burlington, Mass. : |
Publication Dates: | 2008. |
Literature type: | eBook |
Language: | English |
Subjects: | |
Online Access: |
http://www.sciencedirect.com/science/book/9781597491938 |
Summary: |
Nearly forty percent of the world's 1 billion+ Internet users are wireless. It's a truly staggering fact to think that the majority of these wireless implementations are fundamentally insecure, leaving users and private data at risk. Many wireless proprietors think that the convenience of wireless outweighs the possible risk of insecure impelentation, or that secure wireless is far too complicated to worry about deploying. SonicWALL Secure Wireless Networks Integrated Solutions Guide provides a systematic approach to creating secure wireless networks, using the Plan, Design, Implement, and O |
Carrier Form: | 1 online resource (xxii, 483 pages) : illustrations |
Bibliography: | Includes bibliographical references (pages 463-470) and index. |
ISBN: |
9781597491938 1597491934 |
Index Number: | QA76 |
CLC: | TP393.08 |
Contents: | Preface -- Using This Book -- Part 1: Planning -- Chapter 1: Introduction to Secure Wireless Networking -- Chapter 2: Planning Wireless Access Deployments -- Chapter 3: Creating and Defining a Network Security Policy -- Chapter 4: Wireless Solutions for Vertical Markets -- Part 2: Designing -- Chapter 5: SonicWALL Products Solutions Library -- Chapter 6: Three Phases for a Secure Wireless Network -- Chapter 7: Designing for User Segmentation -- Part 3: Implementing -- Phase 1: Deploying the UTM Gateway -- Chapter 8: Configuring SonicWALL UTM Gateway Appliances -- Chapter 9: Configuring User |