The Advantages of Reading This Book

The Advantages of Reading This Book

After reading this book, you should have a solid understanding of the technical basics of security and wireless issues. In addition, you should know how to develop reliable security mitigations in wireless systems, based on the results of a process that includes learning a system, assessing its risks, and developing an appropriate security framework. Situations will arise in which security and functionality trade-offs are necessary. Those decision makers armed with a full understanding of the risks involved will have a distinct advantage. Should business requirements dictate that certain vulnerabilities remain unmitigated, appropriate contingency plans can be developed. In the event of a system compromise, business can continue as usual because security was an integral part of the system's development. Uninformed counterparts, however, will likely be busy fighting fires and attempting to force security measures into their existing infrastructures.

For more information on this book or for other books useful in designing and developing systems, please consult the Addison-Wesley Web site at http://www.awprofessional.com.

 



Wireless Security and Privacy(c) Best Practices and Design Techniques
Wireless Security and Privacy: Best Practices and Design Techniques
ISBN: 0201760347
EAN: 2147483647
Year: 2002
Pages: 73

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net