
CWSP Certified Wireless Security Professional Official Study Guide: Exam PW0-204
by David D. Coleman (Alcoa Technical Center); David A. Westcott; Bryan E. Harkins; Shawn M. JackmanRent Book
New Book
We're Sorry
Sold Out
Used Book
We're Sorry
Sold Out
eBook
We're Sorry
Not Available
Summary
Table of Contents
Wireless Security Basics | |
Legacy 802.11 Security | |
Encryption Ciphers and Methods | |
Enterprise 802.11 Layer 2 Authentication Methods | |
802.11 Dynamic Encryption Key Generation | |
SOHO 802.11 Security | |
802.11 Fast Secure Roaming | |
Wireless Security Risks | |
Wireless LAN Security Auditing | |
Wireless Security Monitoring | |
VPNs, Remote Access, and Guest Access Services | |
Wireless Security Infrastructure | |
Wireless Security Policies | |
Table of Contents provided by Publisher. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.