COVID-19 Response at Fishpond.com.au

Read what we're doing...

Cwsp Guide to Wireless Security
By

Rating

Product Description
Product Details

Table of Contents

Chapter 1: Introduction to Wireless Security Chapter 2: Wireless LAN Vulnerabilities Chapter 3: Passive Wireless Discovery Chapter 4: Active Wireless Attacks Chapter 5: WLAN Security Models Chapter 6: Security In Wireless Devices Chapter 7: Designing a Secure Wireless Network Chapter 8:Secure Wireless Authentication Chapter 9:Secure Wireless Transmission using VPN Chapter 10: Monitoring the Wireless Network Chapter 11: Wireless Security Policy Chapter 12: Testing the Wireless Network APPENDIX A:CWSP CERTIFICATION EXAMINATION OBJECTIVES

About the Author

Dr. Mark Ciampa is a Professor of Information Systems in the Gordon Ford College of Business at Western Kentucky University in Bowling Green, Kentucky. Prior to this he was an Associate Professor and served as the Director of Academic Computing at Volunteer State Community College in Gallatin, Tennessee for 20 years. Dr. Ciampa has worked in the IT industry as a computer consultant for businesses, government agencies and educational institutions. He has published more than 20 articles in peer-reviewed journals and has written more than 25 technology textbooks, including COMPTIA CYSA+ GUIDE TO CYBERSECURITY ANALYST, SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, SECURITY AWARENESS: APPLYING PRACTICAL SECURITY IN YOUR WORLD, CWNA GUIDE TO WIRELESS LANS, and GUIDE TO WIRELESS COMMUNICATIONS. Dr. Ciampa holds a Ph.D. in technology management with a specialization in digital communication systems from Indiana State University and has certifications in security and healthcare.

Reviews

Chapter 1: Introduction to Wireless Security Chapter 2: Wireless LAN Vulnerabilities Chapter 3: Passive Wireless Discovery Chapter 4: Active Wireless Attacks Chapter 5: WLAN Security Models Chapter 6: Security In Wireless Devices Chapter 7: Designing a Secure Wireless Network Chapter 8: Secure Wireless Authentication Chapter 9: Secure Wireless Transmission using VPN Chapter 10: Monitoring the Wireless Network Chapter 11: Wireless Security Policy Chapter 12: Testing the Wireless Network APPENDIX A:CWSP CERTIFICATION EXAMINATION OBJECTIVES

Ask a Question About this Product More...
Write your question below:
Look for similar items by category
Home » Books » Computers » Networking » General
Home » Books » Computers » Security » Networking
People also searched for
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 5% commission by selling Cwsp Guide to Wireless Security on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Back to top