Table of contents: pt. I Rethinking IT and Security ch. 1 Tectonic Shifts 1.1.Disruptive Forces 1.2.Deconstructing Cloud Computing 1.2.1.NIST Definition 1.2.2.The Three Service Models 1.2.3.The Four Deployment Models 1.3.The Rise of Mobility 1.4.New IT ch. 2 The Evolving Threat Landscape 2.1.From Cryptographers to World Leaders 2.2.The Changing Threat Landscape 2.3.Hacktivist…
Contents: PART ONE Introduction to wireless and mobile networks Chapter 1 The evolution of data networks Chapter 2 The evolution of wired networking to wireless networking Chapter 3 The mobile revolution Chapter 4 Security threats overview: wired, wireless, and mobile PART TWO WLAN security Chapter 5 How do WLANs work Chapter 6 WLAN and IP networking threat and vulnerability a…