MARC details
000 -LEADER |
fixed length control field |
02153cam a22002655a 4500 |
001 - CONTROL NUMBER |
control field |
16858562 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20201128024416.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
110706t2012 flua frb 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2011028410 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781578087686 (hardcover) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Modifying agency |
DLC |
-- |
EG-ScBUE |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
621.384 |
Item number |
OST |
Edition number |
22 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Osterhage, Wolfgang. |
245 10 - TITLE STATEMENT |
Title |
Wireless security / |
Statement of responsibility, etc |
Wolfgang Osterhage. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Boca Raton, FL : |
Name of publisher, distributor, etc |
CRC Press ; |
Place of publication, distribution, etc |
Jersey, UK ; |
-- |
Enfield, New Hampshire : |
Name of publisher, distributor, etc |
Science Publishers, |
Date of publication, distribution, etc |
c.2012.. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvii, 212 p. : |
Other physical details |
ill. ; |
Dimensions |
22 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
In the wake of the growing use of wireless communications, new types of security risks have evolved. Wireless Security covers the major topic of wireless communications with relevance both to organizations and private users. The technological background of these applications and protocols is laid out and presented in detail. Special emphasis is placed on the IEEE 802.11x-Standards that have been introduced for WLAN technology. Other technologies covered besides WLAN include: mobile phones, bluetooth and infrared.<br/><br/>In each chapter a major part is devoted to security risks and provisions including encryption and authentication philosophies. Elaborate checklists have been provided to help IT administrators and security officers to achieve the maximum possible security in their installations, when using wireless technology.<br/><br/>The book offers all necessary background information to this complex technological subject. It is at the same time a guideline and a working tool to implement a security strategy in organizations, assists in documenting the actual security status of existing installations, helps to avoid pitfalls, when operating in a wireless environment, and in configuring the necessary components. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Wireless communication systems |
General subdivision |
Security measures. |
Source of heading or term |
BUEsh |
9 (RLIN) |
40706 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Mobile communication systems |
General subdivision |
Security measures. |
Source of heading or term |
BUEsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Wireless LANs |
General subdivision |
Security measures. |
Source of heading or term |
BUEsh |
9 (RLIN) |
1959 |
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME |
Source of heading or term |
BUEsh |
653 ## - INDEX TERM--UNCONTROLLED |
Resource For college |
Informatics and Computer Science |
Arrived date list |
May2019 |
952 ## - LOCATION AND ITEM INFORMATION (KOHA) |
-- |
2019-05-13 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |