Requires Free Membership to View
Information Security Decisions Fall 2005.
With standards in place, enterprise network managers finally have the opportunity to build secure wireless networks to meet a wide range of requirements. In this presentation, Joel delivers state-of-the-art expertise on how to build and deploy secure wireless networks for enterprises of all sizes. Major wireless security strategies, including IEEE 802.11i/802.1X, IPsec and other tunneling systems, and proprietary wireless security systems, are presented so you can select the best technology that meets your specific requirements. Adjunct technologies, including wireless IDS and other denial-of-service tools, are also brought into focus. In short, you learn the information required to design and deploy your own secure wireless network including the 10 most important tactics no one should be without. | |||||||||
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation