|
Showing 1 - 5 of
5 matches in All Departments
The Newnes Know It All Series takes the best of what our authors
have written to create hard-working desk references that will be an
engineer's first port of call for key information, design
techniques and rules of thumb. Guaranteed not to gather dust on a
shelf
Communications engineers need to master a wide area of topics to
excel. The "Wireless Security Know It All" covers every angle
including Emerging Wireless Technologies and Security Issues,
Wireless LAN and MAN Security, as well as Wireless Personal Area
Networks.
A 360-degree view from our best-selling authors
Topics include Today s Wireless Technology, Security Definitions
and Concepts, and Wireless Handheld devices
The ultimate hard-working desk reference; all the essential
information, techniques and tricks of the trade in one volume"
Every year, nearly one in five businesses suffers a major
disruption to its data or voice networks or
communications systems. Since 9/11 it has become increasingly
important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the
operational and day-to-day security
management requirements of business stability and disaster recovery
planning specifically tailored for the needs and requirements of an
Information Security Officer.
This book has been written by battle tested security consultants
who have based all the material, processes and problem- solving on
real-world planning and recovery events in enterprise environments
world wide.
John has over 25 years experience in the IT and security sector. He
is an often sought management consultant for large enterprise and
is currently a member of the Federal Communication Commission's
Homeland Security Network Reliability and Interoperability Council
Focus Group on Cybersecurity, working in the Voice over Internet
Protocol workgroup.
James has over 30 years experience in security operations and
technology assessment as a corporate security executive and
positions within the intelligence, DoD, and federal law enforcement
communities. He has a Ph.D. in information systems specializing in
information security and is a member of Upsilon Pi Epsilon (UPE),
the International Honor Society for the Computing and Information
Disciplines. He is currently an Independent Consultant.
.Provides critical strategies for maintaining basic business
functions when and if systems are shut down
.Establishes up to date methods and techniques for maintaining
second site back up and recovery
.Gives managers viable and efficient processes that meet new
government rules for saving and protecting data in the event of
disasters"
BRIEF DESCRIPTION OF CONTENT:
There is a significant need for a comprehensive book addressing the
operational and day-to-day security management requirements. IM,
used in enterprise networks can easily be reconfigured and allow
for potentially nonstop exposure; they require the level of
security be scrutinized carefully. This includes inherent security
flaws in various network architectures that result in additional
risks to otherwise secure converged networks. A few books cover
components of the architecture, design, theory, issues, challenges,
and recommended policies for IM security, but none of them address
IM issues in a manner that is useful for the day-to-day operations
and management of enterprise networks. IM Security is intended to
bridge this gap.
UNIQUE FEATURE/RATIONALE
There are no current books that cover components of the
architecture, design, theory, issues, challenges, and recommended
policies for IM security. No book we know of addresses IM security
in a manner useful for day-to-day operations and management of
IM-capable networks in today s corporate environment.
* Up-to-date coverage of architecture, design, theory, issues,
challenges, and recommended policies for IM security.
* Addresses IM security for day-to-day operations and management of
IM-capable networks in today s corporate environment"
Voice Over Internet Protocol Security has been designed to help the
reader fully understand, prepare for and mediate current security
and QoS risks in today s complex and ever changing converged
network environment and it will help you secure your VoIP network
whether you are at the planning, implementation, or
post-implementation phase of your VoIP infrastructure.
* This book will teach you how to plan for and implement VoIP
security solutions in converged network infrastructures. Whether
you have picked up this book out of curiosity or professional
interest . . . it is not too late to read this book and gain a deep
understanding of what needs to be done in a VoIP implementation.
* In the rush to be first to market or to implement the latest and
greatest technology, many current implementations of VoIP
infrastructures, both large and small, have been implemented with
minimal thought to QoS and almost no thought to security and
interoperability.
This comprehensive wireless network book addresses the operational
and day-to-day security management requirements of 21st century
companies. Wireless networks can easily be reconfigured, are very
mobile, allow for potentially nonstop exposure, and require the
level of security be scrutinized even more than for wired networks.
This includes inherent security flaws in various wireless
architectures that result in additional risks to otherwise secure
converged wired networks. An even worse scenario is one where an
insecure wireless network is connected to a weakly secured or
insecure wired network and the wireless subnet is not separated
from the wired subnet. There are approximately a dozen popular
books that cover components of the architecture, design, theory,
issues, challenges, and recommended policies for wireless security,
none of which address them in a practical, operationally-oriented
and comprehensive way. Wireless Operational Security bridges this
gap.
*Presents a new "WISDOM" model for Wireless Security
Infrastructures
*Acts as a critical guide to implementing "Converged Networks"
wired/wireless with all necessary security considerations
*Rittinghouse's Cybersecurity Operations Handbook is the only
security book recommended by the FCC
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R164
Discovery Miles 1 640
Loot
Nadine Gordimer
Paperback
(2)
R205
R164
Discovery Miles 1 640
|