CWSP : certified wireless security professional official study guide / David Coleman ... [et al.].

Contributor(s): Coleman, David DSeries: Serious skills: Publisher: Indianapolis, Ind. : Wiley Pub., c2010Edition: 1st edDescription: li, 641 p. : ill. ; 24 cm. + 1 CD-ROM (4 3/4 in.)ISBN: 0470438916; 9780470438916Subject(s): Telecommunications engineers -- Certification | Wireless communication systems -- Security measures -- ExaminationsDDC classification: 005.8076,COL Online resources: Contributor biographical information | Publisher description | Table of contents only
Contents:
WLAN Security Overview (Page-1), Legacy 802.11 Security (Page-29), Encryption Ciphers and Methods (Page-61), 802.1X/EAP Authentication (Page-87), 802.11 Layer 2 Dynamic Encryption Key Generation (Page-151), PSK Authentication (Page-193), 802.11 Fast Secure Roaming (Page-215), WLAN Security Infrastructure (Page-257), RADIUS and LDAP (Page-291), Bring Your Own Device (BYOD) and Guest Access (Page-319), Wireless Security Troubleshooting (Page-365), Wireless Security Risks (Page-397), Wireless LAN Security Auditing (Page-439), Wireless Security Monitoring (Page-469), Wireless Security Policies (Page-517).
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Shelving location Call number URL Status Notes Date due Barcode Item holds
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
General Stacks 005.8076,COL (Browse shelf) Link to resource Available Almirah No.9, Shelf No.4 MCS35075
Total holds: 0

WLAN Security Overview (Page-1), Legacy 802.11 Security (Page-29), Encryption Ciphers and Methods (Page-61), 802.1X/EAP Authentication (Page-87), 802.11 Layer 2 Dynamic Encryption Key Generation (Page-151), PSK Authentication (Page-193), 802.11 Fast Secure Roaming (Page-215), WLAN Security Infrastructure (Page-257), RADIUS and LDAP (Page-291), Bring Your Own Device (BYOD) and Guest Access (Page-319), Wireless Security Troubleshooting (Page-365), Wireless Security Risks (Page-397), Wireless LAN Security Auditing (Page-439), Wireless Security Monitoring (Page-469), Wireless Security Policies (Page-517).

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.