Skip to content
Scan a barcode
Scan
Hardcover Cisco Wireless LAN Security Book

ISBN: 1587051540

ISBN13: 9781587051548

Cisco Wireless LAN Security

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Hardcover

Condition: Very Good

$6.59
Save $60.40!
List Price $66.99
Almost Gone, Only 3 Left!

Book Overview

Expert guidance for securing your 802.11 networks Learn best practices for securely managing, operating, and scaling WLANs Comprehend the security-related technological underpinnings of WLANs Explore... This description may be from another edition of this product.

Customer Reviews

5 ratings

Excellent Resource for Any WLAN Administrators

The four authors of Cisco Wireless LAN Security do an excellent job of striking a balance between writing concise enough that the book is not overwhelming, but detailed enough for the reader to truly understand the subject matter. Not an easy task. The book is titled Cisco Wireless LAN Security, which might actually make some people shy away from it, but the Cisco part is a bit of a misnomer. Some of the information and examples are Cisco-centric, but the majority of the information in the book is vendor-neutral and should be understood and applied on just about any wireless network. The beginning chapters provide an excellent framework for those new to wireless LAN technology, but it quickly moves beyond that to much deeper and more complex subjects within wireless LAN security. The discussion of wireless vulnerabilities and on wireless security techniques helps you gain an understanding that you can take away from the book and apply to your unique situation. The configuration samples and examples throughout the book are excellent. I don't recommend that someone new to wireless networks pick this up, but anyone tasked with protecting or securing a wireless LAN should definitely use this book as a resource.

Title may be misleading...

OK, the title does indeed tell a great deal about this particular book: However, the "Cisco" tag may be misleading. Cisco WLAN Equipment and even some terminology is used throughout this text. With a Vendor's badge on the cover and name in the title it prepared me for an extremely biased volume of configurations and presentations on Cisco specific technology. This text greatly exceeded a book with that good but narrower approach. A great plus of this particular text is the detail it provides on technology and design criteria which is applicable to WLAN security regardless of technology vendor. It has taken the place of my best vendor agnostic text as the first reference I grab. Kirshna, Sri, Andrew, and Darrin have delivered the subtitle "Expert guidance for securing your 802.11 networks" in 13 chapters. Vast majority of their 395 pages of text and diagrams are not only applicable but extremely valuable to anyone charged with designing, implementing, and administrating WLANs in today's security conscious environment. Guidance on secure WLAN design is far more than delivery of some cookie cutter equipment configs. The authors obviously recognized this and exceeded this reader's expectation. Their guidance was achieved by delivering sufficient detail on all the technologies and interdependencies that are required to deliver WLAN Security. They did not pave a single configuration which would have had too narrow an audience. They provided the foundation which enables, even seasoned WLAN engineers, to deliver for a wide variety of business requirements. My copy has loads of dog-eared pages. Those pages mark specific paragraphs which have been very valuable in customer and support organization presentations. If you're interested in designing secure WLAN which fits your customer's needs and performs well. Then, you should pick up a copy of this text. I'm looking for an update from these guys which includes some of the additional features and functions available in the latest "Cisco" WLAN technologies from both Aironet and Airespace teams. Great book for a WLAN designer, implementor, operator, or manager of any of those resources.

Good treatment of the topic on Wireless LAN Security

The title is definitely in alignment with the content. A basic-to-intermediate discussion of security, as it applies to wireless LANs, is presented in this book. When I completed the book, I certainly had a much better understanding of wireless LAN security fundamentals - both generically and with a Cisco slant. The book has contributions from 4 persons, which may explain the healthy perspective given to the subject of wireless LAN security. I know the number of chapters of a book can't always tell much of the story, but in the case of the 13 chapters contained in this book - spread out over almost 400 pages - I immediately felt that no single chapter would contain an amount of information that may be overwhelming as far as being able to retain my focus. The 2 final chapters comprised the greatest number of pages for any single chapter, and rightfully so. It would have been a compromise of the completion of the overall material to have limited the number of pages involving configuration examples and deployment scenarios. I really appreciated chapter 2. This chapter was titled "Basic Security Mechanics and Mechanisms", and the content was just as the title suggested. The subject matter discussed security without any connection to wireless LANs. With "Security" being a complete topic all by itself, it was beneficial to have a little introduction to some generic security fundamentals before blending this topic with wireless networking. If the subject of computer/network security is not your forte, then you'll be served well with this brief exposure. Chapters 3 and 4 were a welcomed addition because they provided a "warm-up" to wireless networking. The authors, in my opinion, did a very good job in not assuming that the reader would be a seasoned veteran of wireless networking. With chapters 2, 3 and 4 leading the way, the groundwork was set for a solid comprehension for the remainder of the book. So, it is in chapter 5 -- "WLAN Basic Authentication and Privacy Methods" -- where the discussion of security for wireless LANs really begins. Once again, the title of the chapter is in sync with the content. What's provided is some light exposure to security methods. The information in the previous chapters really help to digest this chapter's material. This chapter is one of the "key" chapters in the book's presentation of wireless LAN security; the foundation to the discussion of wireless LAN security begins here. The remaining chapters up to chapter 11 contained more in-depth discussion of security in the wireless LAN. I was pleased to see a discussion on the Wireless Domain Services (WDS), Wireless LAN Solution Engine, and Cisco Structured Wireless Aware Network (SWAN). While there's plenty of information at Cisco's website regarding these mechanisms, including the information in the context of the book content enhanced my understanding. I don't believe this is a book that is intended to prepare for any Cisco-related certificatio

the one

used this book with the CWSP book and passed the CWSP with flying colors. This book is very detailed and must be read slow to retain and more important implement the solutions.

Cisco wireless security at its best

Wireless and security go hand-in-hand. Enabling wireless without implementing security is a disservice to your client; it makes them totally vulnerable to intrusion. This book gives you the technical capabilities and knowledge to understand what it takes to implement current (2004-2005) security techniques in your Cisco Aironet wireless environment. It includes detailed information, including sample IOS configurations, about Cisco wireless security and intrusion prevention. The book flows well from chapter to chapter and builds upon previous topics. The authors discuss Cisco SWAN (Structured Wireless Aware Networks) in depth and then offer several enterprise wireless deployment scenarios. All-in-all, a very well-written technical manual that I highly recommend for WLAN engineers implementing Cisco Aironet solutions. This book was written before the Airespace acquisition and does not cover that architecture.
Copyright © 2024 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured