Cover art for Wireless Security Architecture
Published
Wiley, April 2022
ISBN
9781119883050
Format
Softcover, 624 pages
Dimensions
23.4cm × 18.8cm × 3.3cm

Wireless Security Architecture Designing and Maintaining Secure Wireless for Enterprise

Not in stock
Fast $7.95 flat-rate shipping!
Only pay $7.95 per order within Australia, including end-to-end parcel tracking.
100% encrypted and secure
We adhere to industry best practice and never store credit card details.
Talk to real people
Contact us seven days a week – our staff are here to help.

Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT security solutions

Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint to a resilient and compliant architecture that responds to regulatory requirements, reduces organizational risk, and conforms to industry best practices. This book emphasizes WiFi security, as well as guidance on private cellular and Internet of Things security.

Readers will discover how to move beyond isolated technical certifications and vendor training and put together a coherent network that responds to contemporary security risks. It offers up-to-date coverage-including data published for the first time-of new WPA3 security, Wi-Fi 6E, zero-trust frameworks, and other emerging trends. It also includes:

Concrete strategies suitable for organizations of all sizes, from large government agencies to small public and private companies

Effective technical resources and real-world sample architectures

Explorations of the relationships between security, wireless, and network elements

Practical planning templates, guides, and real-world case studies demonstrating application of the included concepts

Perfect for network, wireless, and enterprise security architects, Wireless Security Architecture belongs in the libraries of technical leaders in firms of all sizes and in any industry seeking to build a secure wireless network.

Related books