Wireless Security: Know It All (Newnes Know It All)
ISBN-13:
9781856175296
ISBN-10:
1856175294
Edition:
1
Author:
Jon S. Wilson, Dan Bensky, Praphul Chandra, Tony Bradley, Frank Thornton, Chris Lanthem, Chris Hurley, Steve A. Rackley, John Rittinghouse PhD CISM, James F. Ransome PhD CISM CISSP, Timothy Stapko, George L Stefanek
Publication date:
2008
Publisher:
Newnes
Format:
Paperback
744 pages
Category:
Computer Certification
FREE US shipping
Book details
ISBN-13:
9781856175296
ISBN-10:
1856175294
Edition:
1
Author:
Jon S. Wilson, Dan Bensky, Praphul Chandra, Tony Bradley, Frank Thornton, Chris Lanthem, Chris Hurley, Steve A. Rackley, John Rittinghouse PhD CISM, James F. Ransome PhD CISM CISSP, Timothy Stapko, George L Stefanek
Publication date:
2008
Publisher:
Newnes
Format:
Paperback
744 pages
Category:
Computer Certification
Summary
Wireless Security: Know It All (Newnes Know It All) (ISBN-13: 9781856175296 and ISBN-10: 1856175294), written by authors
Jon S. Wilson, Dan Bensky, Praphul Chandra, Tony Bradley, Frank Thornton, Chris Lanthem, Chris Hurley, Steve A. Rackley, John Rittinghouse PhD CISM, James F. Ransome PhD CISM CISSP, Timothy Stapko, George L Stefanek, was published by Newnes in 2008.
With an overall rating of 3.9 stars, it's a notable title among other
Computer Certification
books. You can easily purchase or rent Wireless Security: Know It All (Newnes Know It All) (Paperback) from BooksRun,
along with many other new and used
Computer Certification
books
and textbooks.
And, if you're looking to sell your copy, our current buyback offer is $0.95.
Description
The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!
Communications engineers need to master a wide area of topics to excel. The Wireless Security Know It All covers every angle including Emerging Wireless Technologies and Security Issues, Wireless LAN and MAN Security, as well as Wireless Personal Area Networks.
We would LOVE it if you could help us and other readers by reviewing the book
Book review
Congratulations! We have received your book review.
{user}
{createdAt}
by {truncated_author}