0%

Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT security solutions

Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint to a resilient and compliant architecture that responds to regulatory requirements, reduces organizational risk, and conforms to industry best practices. This book emphasizes WiFi security, as well as guidance on private cellular and Internet of Things security.

Readers will discover how to move beyond isolated technical certifications and vendor training and put together a coherent network that responds to contemporary security risks. It offers up-to-date coverage—including data published for the first time—of new WPA3 security, Wi-Fi 6E, zero-trust frameworks, and other emerging trends. It also includes:

  • Concrete strategies suitable for organizations of all sizes, from large government agencies to small public and private companies
  • Effective technical resources and real-world sample architectures
  • Explorations of the relationships between security, wireless, and network elements
  • Practical planning templates, guides, and real-world case studies demonstrating application of the included concepts

Perfect for network, wireless, and enterprise security architects, Wireless Security Architecture belongs in the libraries of technical leaders in firms of all sizes and in any industry seeking to build a secure wireless network.

Table of Contents

  1. Cover
  2. Title Page
  3. Foreword
  4. Preface
  5. Introduction
  6. Part I: Technical Foundations
  7. Part II: Putting It All Together
  8. Part III: Ongoing Maintenance and Beyond
  9. Appendix A: Notes on Configuring 802.1X with Microsoft NPS
  10. Appendix B: Additional Resources
  11. Appendix C: Sample Architectures
  12. Appendix D: Parting Thoughts and Call to Action
  13. Index
  14. Copyright
  15. Dedication
  16. About the Author
  17. About the Technical Editor
  18. Acknowledgments
  19. End User License Agreement
3.141.202.187