Wi-Fi Enabled Healthcare.

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Place / Publishing House:Milton : : Auerbach Publishers, Incorporated,, 2014.
Ã2014.
Year of Publication:2014
Edition:1st ed.
Language:English
Online Access:
Physical Description:1 online resource (301 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 5007245680
ctrlnum (MiAaPQ)5007245680
(Au-PeEL)EBL7245680
(OCoLC)872619775
collection bib_alma
record_format marc
spelling Youssef, Ali.
Wi-Fi Enabled Healthcare.
1st ed.
Milton : Auerbach Publishers, Incorporated, 2014.
Ã2014.
1 online resource (301 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Foreword -- Preface -- Chapter 1 Brief History of Wi-Fi -- History and Current Growth and Proliferation of Wi-Fi in Hospitals -- Regulatory Bodies -- Federal Communications Commission -- Institute of Electrical and Electronics Engineers -- Wi-Fi Alliance -- Core Programs -- Optional Programs -- International Organization for Standardization -- Wi-Fi Impacts on Clinical Workflow -- mHealth -- Endnotes -- Chapter 2 Wireless Architecture Considerations -- About Wi-Fi Networks -- The MAC Layer -- Vendor-Specific Solutions -- Autonomous Architecture -- Controller-Based Architectures -- Distributed Architecture -- Medical Devices -- Medical Imaging -- Wireless on Wheels -- Tablets and Smart Phones -- Bonjour -- Chapter 3 Site Survey Process -- Wireless Site Survey Process -- Preparation -- The Statement of Work -- Facility Blueprints -- Pre-Survey Walkthrough -- Design Considerations -- High-Capacity Design -- Channel Planning -- Multifloor Designs -- Aesthetics -- Augmenting Existing Designs -- Upgrading Access Point Hardware -- Cabling -- Network Infrastructure -- Network Ports -- Power Availability -- Network Bandwidth -- IP Address Availability -- Survey Equipment -- Form Factor -- Site Survey Design Software -- Spectrum Analyzer -- Survey Types -- Predictive Survey -- Passive Survey -- Active Survey -- Survey Techniques -- Site Survey Report -- Post-Validation Survey -- Chapter 4 Wireless Security Wi-Fi -- About Information Security and Wireless Networking -- Confidentiality -- Availability -- Integrity -- Wireless Security Risks and Threats -- Denial of Service -- Malicious Code -- Social Engineering -- Signal Analysis -- Spoofing -- Rogue Access Points -- Wireless Hacking and Hackers -- Motives of Wireless Hackers -- War Driving -- Tracking War Drivers.
The Hacking Process -- Information Gathering -- Enumeration -- Compromise -- Expanding Privileges and Accessibility -- Cleaning Up the Trails -- Service Set Identifier -- Shared Key Authentication -- Open Key Authentication -- Wired Equivalent Privacy Standard -- 802.1x -- Authentication Server -- Authenticator -- Supplicant -- Extensive Authentication Protocol over Local Area Network (EAPOL) -- Remote Authentication Dial-In User Service (RADIUS) -- Extensible Authentication Protocol -- EAP-MD5 -- EAP-TLS -- EAP-TTLS -- LEAP -- PEAP -- EAP-FAST -- Wi-Fi Protected Access -- 802.11i -- Robust Secure Network (RSN) -- Transition Secure Network (TSN) -- Temporal Key Integrity Protocol -- TKIP MIC -- Advance Encryption Standard -- 802.11i System Overview -- Wi-Fi Protected Access -- Rogue Access Points Detection -- Wireless Security Tools -- Scanning Tools -- Sniffing Tools -- Hybrid Tools -- Cracking Tools -- Access Point Attacking Tools -- Wireless Security Policy Areas -- Password Policy -- Access Policy -- Rogue Access Point Policy -- Guest Access Policy -- Remote WLAN Access Policy -- Physical Security -- Wireless Monitoring and Security Incident Response -- HIPAA and Wi-Fi -- Chapter 5 Wireless Guest Services -- Sponsored, Open Access, and Self-Enrollment -- Sponsored Guest Access -- Self-Enrollment Guest Access -- Open Access -- Captive Portal Page Types -- No Registration Splash Page -- Self-Registration -- Manual Registration -- Sponsored Registration -- Supporting Infrastructure -- Revenue Generation -- Bring Your Own Device (BYOD) -- SCEP -- Endnotes -- Chapter 6 Mobile Medical Devices -- Functional Testing -- Network Testing -- Failover and Redundancy Test -- Mobile X-Ray Machines -- Medication Dispensing Systems -- IV Pumps -- Electrocardiogram Carts -- Ultrasound Devices -- Blood Gas Analyzers -- Hemodialysis Machines -- mHealth.
Chapter 7 Voice over Wi-Fi -- Why VoWi-Fi? -- The Challenges of VoWi-Fi -- Quality of Service Fundamentals -- Evolution of QoS -- The Journey of a Voice Packet -- What Happens at Phone One -- What Happens at the Access Point -- What Happens at Switch One -- What Happens at the Router -- Differentiated Services -- 802.1Q -- Anatomy of VoIP -- The Anatomy of Codecs -- Proprietary Protocols -- Wireless Arbitration -- Troubleshooting VoWi-Fi -- Roaming -- Chapter 8 Real-Time Location Services -- RTLS Technologies -- ZigBee -- Wi-Fi -- Infrared -- Ultrasound -- How RTLS Works -- Architecture -- ISO/IEC Standards -- Different Types of Transmitters -- Applications -- Asset Management -- Equipment Rentals -- Shrinkage -- Condition Monitoring -- Patient and Clinician Safety -- Infection Control -- Workflow -- RTLS Issues -- Privacy Concerns -- Challenges with Accuracy -- Maintenance and Costs -- Chapter 9 The Wireless Project Management Process -- Refining the Scope -- Scheduling and Developing Milestones -- Developing a Budget -- Quality Assurance -- Communication Strategy -- Risk Management -- Change Management -- Closure Criteria -- 1. Identify Key Stakeholders and Set up a Kickoff Meeting -- 2. Perform an RFI and RFP to Choose a Wireless Vendor -- 3. Survey Network Closets for Port Capacity and POE Availability -- 4. Perform Predictive and Onsite Wireless Survey -- 5. Develop Detailed Physical and Logical Architecture -- 6. Develop a Survey Report and Create a Cabling Bid Package -- 7. Order Hardware and Consider Lead Times on the Project Plan -- 8. Identify Third-Party Training Requirements -- 9. Stage Hardware -- 10. Oversee Installation and Turn-up of Wireless Network Using a Standard Change Management Process -- 11. Ensure that All Hardware Is Set up on the Enterprise Monitoring System -- 12. Validate Channel and Power Plan.
13. Conduct Post-Implementation Survey and Make Modifications as Needed -- 14. Perform UAT (Unit Acceptance Testing) Using Various Form Factors of End-User Devices -- 15. Send a Series of Communications Outlining Offerings with Instructions -- 16. Develop Helpdesk Knowledge Base for Common Troubleshooting -- 17. Create a Runbook -- 18. Handoff Support to Ongoing Operations Team -- 19. Ensure that a Process is in Place for Onboarding and Certifying Wireless Devices -- Chapter 10 Support Considerations and Lifecycle -- Tool Set -- Protocol Analyzer -- Voice Analyzer -- Spectrum Analyzer -- Site Survey Software -- Performance Software -- Packet Capturing -- Wireless Intrusion Prevention Systems (WIPS) -- Wireless Network Management -- Staffing Considerations -- Vendor Neutral Training -- Software Tool Training -- Wireless Manufacturer Training -- Wireless Runbook -- Policies -- Acceptable Use -- Disaster Recovery -- Procedures -- Architecture -- Systems Lifecycle -- Routine Maintenance -- Technical Support -- Tier 1 -- Tier 2 -- Tier 3 -- Tier 4 -- Infrastructure Code Upgrade -- End-User Device Considerations -- Lifecycle and Drivers for System Upgrades -- Infrastructure Lifecycle -- Client Device Lifecycle -- Chapter 11 Emerging Trends and Technologies -- Demand for More Bandwidth and Denser Deployments -- Device Density -- Evolution of the Electronic Medical Record -- Mobile Voice and Video -- Guest Access -- Patient Engagement with Social Media -- Device Consolidation -- Shrinking Herds of Carts on Wheels (CoWs) and Workstations on Wheels (WoWs) -- Key Emerging Technologies -- IEEE 802.11ac -- Infrastructure -- Client Devices -- Design and Planning -- Policy Management and Software Defined Networking (SDN) -- The Rise of the Smart Phone -- Application Performance and Security -- IPv6 -- 802.11u/Hotspot 2.0/Passpoint -- mHealth -- Index.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic books.
McDonald II, Douglas.
Linton, Jon.
Zemke, Bob.
Earle, Aaron.
Print version: Youssef, Ali Wi-Fi Enabled Healthcare Milton : Auerbach Publishers, Incorporated,c2014 9781466560406
ProQuest (Firm)
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=7245680 Click to View
language English
format eBook
author Youssef, Ali.
spellingShingle Youssef, Ali.
Wi-Fi Enabled Healthcare.
Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Foreword -- Preface -- Chapter 1 Brief History of Wi-Fi -- History and Current Growth and Proliferation of Wi-Fi in Hospitals -- Regulatory Bodies -- Federal Communications Commission -- Institute of Electrical and Electronics Engineers -- Wi-Fi Alliance -- Core Programs -- Optional Programs -- International Organization for Standardization -- Wi-Fi Impacts on Clinical Workflow -- mHealth -- Endnotes -- Chapter 2 Wireless Architecture Considerations -- About Wi-Fi Networks -- The MAC Layer -- Vendor-Specific Solutions -- Autonomous Architecture -- Controller-Based Architectures -- Distributed Architecture -- Medical Devices -- Medical Imaging -- Wireless on Wheels -- Tablets and Smart Phones -- Bonjour -- Chapter 3 Site Survey Process -- Wireless Site Survey Process -- Preparation -- The Statement of Work -- Facility Blueprints -- Pre-Survey Walkthrough -- Design Considerations -- High-Capacity Design -- Channel Planning -- Multifloor Designs -- Aesthetics -- Augmenting Existing Designs -- Upgrading Access Point Hardware -- Cabling -- Network Infrastructure -- Network Ports -- Power Availability -- Network Bandwidth -- IP Address Availability -- Survey Equipment -- Form Factor -- Site Survey Design Software -- Spectrum Analyzer -- Survey Types -- Predictive Survey -- Passive Survey -- Active Survey -- Survey Techniques -- Site Survey Report -- Post-Validation Survey -- Chapter 4 Wireless Security Wi-Fi -- About Information Security and Wireless Networking -- Confidentiality -- Availability -- Integrity -- Wireless Security Risks and Threats -- Denial of Service -- Malicious Code -- Social Engineering -- Signal Analysis -- Spoofing -- Rogue Access Points -- Wireless Hacking and Hackers -- Motives of Wireless Hackers -- War Driving -- Tracking War Drivers.
The Hacking Process -- Information Gathering -- Enumeration -- Compromise -- Expanding Privileges and Accessibility -- Cleaning Up the Trails -- Service Set Identifier -- Shared Key Authentication -- Open Key Authentication -- Wired Equivalent Privacy Standard -- 802.1x -- Authentication Server -- Authenticator -- Supplicant -- Extensive Authentication Protocol over Local Area Network (EAPOL) -- Remote Authentication Dial-In User Service (RADIUS) -- Extensible Authentication Protocol -- EAP-MD5 -- EAP-TLS -- EAP-TTLS -- LEAP -- PEAP -- EAP-FAST -- Wi-Fi Protected Access -- 802.11i -- Robust Secure Network (RSN) -- Transition Secure Network (TSN) -- Temporal Key Integrity Protocol -- TKIP MIC -- Advance Encryption Standard -- 802.11i System Overview -- Wi-Fi Protected Access -- Rogue Access Points Detection -- Wireless Security Tools -- Scanning Tools -- Sniffing Tools -- Hybrid Tools -- Cracking Tools -- Access Point Attacking Tools -- Wireless Security Policy Areas -- Password Policy -- Access Policy -- Rogue Access Point Policy -- Guest Access Policy -- Remote WLAN Access Policy -- Physical Security -- Wireless Monitoring and Security Incident Response -- HIPAA and Wi-Fi -- Chapter 5 Wireless Guest Services -- Sponsored, Open Access, and Self-Enrollment -- Sponsored Guest Access -- Self-Enrollment Guest Access -- Open Access -- Captive Portal Page Types -- No Registration Splash Page -- Self-Registration -- Manual Registration -- Sponsored Registration -- Supporting Infrastructure -- Revenue Generation -- Bring Your Own Device (BYOD) -- SCEP -- Endnotes -- Chapter 6 Mobile Medical Devices -- Functional Testing -- Network Testing -- Failover and Redundancy Test -- Mobile X-Ray Machines -- Medication Dispensing Systems -- IV Pumps -- Electrocardiogram Carts -- Ultrasound Devices -- Blood Gas Analyzers -- Hemodialysis Machines -- mHealth.
Chapter 7 Voice over Wi-Fi -- Why VoWi-Fi? -- The Challenges of VoWi-Fi -- Quality of Service Fundamentals -- Evolution of QoS -- The Journey of a Voice Packet -- What Happens at Phone One -- What Happens at the Access Point -- What Happens at Switch One -- What Happens at the Router -- Differentiated Services -- 802.1Q -- Anatomy of VoIP -- The Anatomy of Codecs -- Proprietary Protocols -- Wireless Arbitration -- Troubleshooting VoWi-Fi -- Roaming -- Chapter 8 Real-Time Location Services -- RTLS Technologies -- ZigBee -- Wi-Fi -- Infrared -- Ultrasound -- How RTLS Works -- Architecture -- ISO/IEC Standards -- Different Types of Transmitters -- Applications -- Asset Management -- Equipment Rentals -- Shrinkage -- Condition Monitoring -- Patient and Clinician Safety -- Infection Control -- Workflow -- RTLS Issues -- Privacy Concerns -- Challenges with Accuracy -- Maintenance and Costs -- Chapter 9 The Wireless Project Management Process -- Refining the Scope -- Scheduling and Developing Milestones -- Developing a Budget -- Quality Assurance -- Communication Strategy -- Risk Management -- Change Management -- Closure Criteria -- 1. Identify Key Stakeholders and Set up a Kickoff Meeting -- 2. Perform an RFI and RFP to Choose a Wireless Vendor -- 3. Survey Network Closets for Port Capacity and POE Availability -- 4. Perform Predictive and Onsite Wireless Survey -- 5. Develop Detailed Physical and Logical Architecture -- 6. Develop a Survey Report and Create a Cabling Bid Package -- 7. Order Hardware and Consider Lead Times on the Project Plan -- 8. Identify Third-Party Training Requirements -- 9. Stage Hardware -- 10. Oversee Installation and Turn-up of Wireless Network Using a Standard Change Management Process -- 11. Ensure that All Hardware Is Set up on the Enterprise Monitoring System -- 12. Validate Channel and Power Plan.
13. Conduct Post-Implementation Survey and Make Modifications as Needed -- 14. Perform UAT (Unit Acceptance Testing) Using Various Form Factors of End-User Devices -- 15. Send a Series of Communications Outlining Offerings with Instructions -- 16. Develop Helpdesk Knowledge Base for Common Troubleshooting -- 17. Create a Runbook -- 18. Handoff Support to Ongoing Operations Team -- 19. Ensure that a Process is in Place for Onboarding and Certifying Wireless Devices -- Chapter 10 Support Considerations and Lifecycle -- Tool Set -- Protocol Analyzer -- Voice Analyzer -- Spectrum Analyzer -- Site Survey Software -- Performance Software -- Packet Capturing -- Wireless Intrusion Prevention Systems (WIPS) -- Wireless Network Management -- Staffing Considerations -- Vendor Neutral Training -- Software Tool Training -- Wireless Manufacturer Training -- Wireless Runbook -- Policies -- Acceptable Use -- Disaster Recovery -- Procedures -- Architecture -- Systems Lifecycle -- Routine Maintenance -- Technical Support -- Tier 1 -- Tier 2 -- Tier 3 -- Tier 4 -- Infrastructure Code Upgrade -- End-User Device Considerations -- Lifecycle and Drivers for System Upgrades -- Infrastructure Lifecycle -- Client Device Lifecycle -- Chapter 11 Emerging Trends and Technologies -- Demand for More Bandwidth and Denser Deployments -- Device Density -- Evolution of the Electronic Medical Record -- Mobile Voice and Video -- Guest Access -- Patient Engagement with Social Media -- Device Consolidation -- Shrinking Herds of Carts on Wheels (CoWs) and Workstations on Wheels (WoWs) -- Key Emerging Technologies -- IEEE 802.11ac -- Infrastructure -- Client Devices -- Design and Planning -- Policy Management and Software Defined Networking (SDN) -- The Rise of the Smart Phone -- Application Performance and Security -- IPv6 -- 802.11u/Hotspot 2.0/Passpoint -- mHealth -- Index.
author_facet Youssef, Ali.
McDonald II, Douglas.
Linton, Jon.
Zemke, Bob.
Earle, Aaron.
author_variant a y ay
author2 McDonald II, Douglas.
Linton, Jon.
Zemke, Bob.
Earle, Aaron.
author2_variant i d m id idm
j l jl
b z bz
a e ae
author2_role TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
author_sort Youssef, Ali.
title Wi-Fi Enabled Healthcare.
title_full Wi-Fi Enabled Healthcare.
title_fullStr Wi-Fi Enabled Healthcare.
title_full_unstemmed Wi-Fi Enabled Healthcare.
title_auth Wi-Fi Enabled Healthcare.
title_new Wi-Fi Enabled Healthcare.
title_sort wi-fi enabled healthcare.
publisher Auerbach Publishers, Incorporated,
publishDate 2014
physical 1 online resource (301 pages)
edition 1st ed.
contents Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Foreword -- Preface -- Chapter 1 Brief History of Wi-Fi -- History and Current Growth and Proliferation of Wi-Fi in Hospitals -- Regulatory Bodies -- Federal Communications Commission -- Institute of Electrical and Electronics Engineers -- Wi-Fi Alliance -- Core Programs -- Optional Programs -- International Organization for Standardization -- Wi-Fi Impacts on Clinical Workflow -- mHealth -- Endnotes -- Chapter 2 Wireless Architecture Considerations -- About Wi-Fi Networks -- The MAC Layer -- Vendor-Specific Solutions -- Autonomous Architecture -- Controller-Based Architectures -- Distributed Architecture -- Medical Devices -- Medical Imaging -- Wireless on Wheels -- Tablets and Smart Phones -- Bonjour -- Chapter 3 Site Survey Process -- Wireless Site Survey Process -- Preparation -- The Statement of Work -- Facility Blueprints -- Pre-Survey Walkthrough -- Design Considerations -- High-Capacity Design -- Channel Planning -- Multifloor Designs -- Aesthetics -- Augmenting Existing Designs -- Upgrading Access Point Hardware -- Cabling -- Network Infrastructure -- Network Ports -- Power Availability -- Network Bandwidth -- IP Address Availability -- Survey Equipment -- Form Factor -- Site Survey Design Software -- Spectrum Analyzer -- Survey Types -- Predictive Survey -- Passive Survey -- Active Survey -- Survey Techniques -- Site Survey Report -- Post-Validation Survey -- Chapter 4 Wireless Security Wi-Fi -- About Information Security and Wireless Networking -- Confidentiality -- Availability -- Integrity -- Wireless Security Risks and Threats -- Denial of Service -- Malicious Code -- Social Engineering -- Signal Analysis -- Spoofing -- Rogue Access Points -- Wireless Hacking and Hackers -- Motives of Wireless Hackers -- War Driving -- Tracking War Drivers.
The Hacking Process -- Information Gathering -- Enumeration -- Compromise -- Expanding Privileges and Accessibility -- Cleaning Up the Trails -- Service Set Identifier -- Shared Key Authentication -- Open Key Authentication -- Wired Equivalent Privacy Standard -- 802.1x -- Authentication Server -- Authenticator -- Supplicant -- Extensive Authentication Protocol over Local Area Network (EAPOL) -- Remote Authentication Dial-In User Service (RADIUS) -- Extensible Authentication Protocol -- EAP-MD5 -- EAP-TLS -- EAP-TTLS -- LEAP -- PEAP -- EAP-FAST -- Wi-Fi Protected Access -- 802.11i -- Robust Secure Network (RSN) -- Transition Secure Network (TSN) -- Temporal Key Integrity Protocol -- TKIP MIC -- Advance Encryption Standard -- 802.11i System Overview -- Wi-Fi Protected Access -- Rogue Access Points Detection -- Wireless Security Tools -- Scanning Tools -- Sniffing Tools -- Hybrid Tools -- Cracking Tools -- Access Point Attacking Tools -- Wireless Security Policy Areas -- Password Policy -- Access Policy -- Rogue Access Point Policy -- Guest Access Policy -- Remote WLAN Access Policy -- Physical Security -- Wireless Monitoring and Security Incident Response -- HIPAA and Wi-Fi -- Chapter 5 Wireless Guest Services -- Sponsored, Open Access, and Self-Enrollment -- Sponsored Guest Access -- Self-Enrollment Guest Access -- Open Access -- Captive Portal Page Types -- No Registration Splash Page -- Self-Registration -- Manual Registration -- Sponsored Registration -- Supporting Infrastructure -- Revenue Generation -- Bring Your Own Device (BYOD) -- SCEP -- Endnotes -- Chapter 6 Mobile Medical Devices -- Functional Testing -- Network Testing -- Failover and Redundancy Test -- Mobile X-Ray Machines -- Medication Dispensing Systems -- IV Pumps -- Electrocardiogram Carts -- Ultrasound Devices -- Blood Gas Analyzers -- Hemodialysis Machines -- mHealth.
Chapter 7 Voice over Wi-Fi -- Why VoWi-Fi? -- The Challenges of VoWi-Fi -- Quality of Service Fundamentals -- Evolution of QoS -- The Journey of a Voice Packet -- What Happens at Phone One -- What Happens at the Access Point -- What Happens at Switch One -- What Happens at the Router -- Differentiated Services -- 802.1Q -- Anatomy of VoIP -- The Anatomy of Codecs -- Proprietary Protocols -- Wireless Arbitration -- Troubleshooting VoWi-Fi -- Roaming -- Chapter 8 Real-Time Location Services -- RTLS Technologies -- ZigBee -- Wi-Fi -- Infrared -- Ultrasound -- How RTLS Works -- Architecture -- ISO/IEC Standards -- Different Types of Transmitters -- Applications -- Asset Management -- Equipment Rentals -- Shrinkage -- Condition Monitoring -- Patient and Clinician Safety -- Infection Control -- Workflow -- RTLS Issues -- Privacy Concerns -- Challenges with Accuracy -- Maintenance and Costs -- Chapter 9 The Wireless Project Management Process -- Refining the Scope -- Scheduling and Developing Milestones -- Developing a Budget -- Quality Assurance -- Communication Strategy -- Risk Management -- Change Management -- Closure Criteria -- 1. Identify Key Stakeholders and Set up a Kickoff Meeting -- 2. Perform an RFI and RFP to Choose a Wireless Vendor -- 3. Survey Network Closets for Port Capacity and POE Availability -- 4. Perform Predictive and Onsite Wireless Survey -- 5. Develop Detailed Physical and Logical Architecture -- 6. Develop a Survey Report and Create a Cabling Bid Package -- 7. Order Hardware and Consider Lead Times on the Project Plan -- 8. Identify Third-Party Training Requirements -- 9. Stage Hardware -- 10. Oversee Installation and Turn-up of Wireless Network Using a Standard Change Management Process -- 11. Ensure that All Hardware Is Set up on the Enterprise Monitoring System -- 12. Validate Channel and Power Plan.
13. Conduct Post-Implementation Survey and Make Modifications as Needed -- 14. Perform UAT (Unit Acceptance Testing) Using Various Form Factors of End-User Devices -- 15. Send a Series of Communications Outlining Offerings with Instructions -- 16. Develop Helpdesk Knowledge Base for Common Troubleshooting -- 17. Create a Runbook -- 18. Handoff Support to Ongoing Operations Team -- 19. Ensure that a Process is in Place for Onboarding and Certifying Wireless Devices -- Chapter 10 Support Considerations and Lifecycle -- Tool Set -- Protocol Analyzer -- Voice Analyzer -- Spectrum Analyzer -- Site Survey Software -- Performance Software -- Packet Capturing -- Wireless Intrusion Prevention Systems (WIPS) -- Wireless Network Management -- Staffing Considerations -- Vendor Neutral Training -- Software Tool Training -- Wireless Manufacturer Training -- Wireless Runbook -- Policies -- Acceptable Use -- Disaster Recovery -- Procedures -- Architecture -- Systems Lifecycle -- Routine Maintenance -- Technical Support -- Tier 1 -- Tier 2 -- Tier 3 -- Tier 4 -- Infrastructure Code Upgrade -- End-User Device Considerations -- Lifecycle and Drivers for System Upgrades -- Infrastructure Lifecycle -- Client Device Lifecycle -- Chapter 11 Emerging Trends and Technologies -- Demand for More Bandwidth and Denser Deployments -- Device Density -- Evolution of the Electronic Medical Record -- Mobile Voice and Video -- Guest Access -- Patient Engagement with Social Media -- Device Consolidation -- Shrinking Herds of Carts on Wheels (CoWs) and Workstations on Wheels (WoWs) -- Key Emerging Technologies -- IEEE 802.11ac -- Infrastructure -- Client Devices -- Design and Planning -- Policy Management and Software Defined Networking (SDN) -- The Rise of the Smart Phone -- Application Performance and Security -- IPv6 -- 802.11u/Hotspot 2.0/Passpoint -- mHealth -- Index.
isbn 9781000218701
9781466560406
callnumber-first R - Medicine
callnumber-subject R - General Medicine
callnumber-label R119
callnumber-sort R 3119.95 W545 42014EB
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=7245680
illustrated Not Illustrated
dewey-hundreds 600 - Technology
dewey-tens 610 - Medicine & health
dewey-ones 610 - Medicine & health
dewey-full 610.285
dewey-sort 3610.285
dewey-raw 610.285
dewey-search 610.285
oclc_num 872619775
work_keys_str_mv AT youssefali wifienabledhealthcare
AT mcdonaldiidouglas wifienabledhealthcare
AT lintonjon wifienabledhealthcare
AT zemkebob wifienabledhealthcare
AT earleaaron wifienabledhealthcare
status_str n
ids_txt_mv (MiAaPQ)5007245680
(Au-PeEL)EBL7245680
(OCoLC)872619775
carrierType_str_mv cr
is_hierarchy_title Wi-Fi Enabled Healthcare.
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
marc_error Info : Unimarc and ISO-8859-1 translations identical, choosing ISO-8859-1. --- [ 856 : z ]
_version_ 1792331067225538560
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>09089nam a22004693i 4500</leader><controlfield tag="001">5007245680</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20240229073848.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">240229s2014 xx o ||||0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000218701</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781466560406</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5007245680</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL7245680</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)872619775</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">R119.95.W545 2014eb</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">610.285</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Youssef, Ali.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Wi-Fi Enabled Healthcare.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Milton :</subfield><subfield code="b">Auerbach Publishers, Incorporated,</subfield><subfield code="c">2014.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">Ã2014.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (301 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Foreword -- Preface -- Chapter 1 Brief History of Wi-Fi -- History and Current Growth and Proliferation of Wi-Fi in Hospitals -- Regulatory Bodies -- Federal Communications Commission -- Institute of Electrical and Electronics Engineers -- Wi-Fi Alliance -- Core Programs -- Optional Programs -- International Organization for Standardization -- Wi-Fi Impacts on Clinical Workflow -- mHealth -- Endnotes -- Chapter 2 Wireless Architecture Considerations -- About Wi-Fi Networks -- The MAC Layer -- Vendor-Specific Solutions -- Autonomous Architecture -- Controller-Based Architectures -- Distributed Architecture -- Medical Devices -- Medical Imaging -- Wireless on Wheels -- Tablets and Smart Phones -- Bonjour -- Chapter 3 Site Survey Process -- Wireless Site Survey Process -- Preparation -- The Statement of Work -- Facility Blueprints -- Pre-Survey Walkthrough -- Design Considerations -- High-Capacity Design -- Channel Planning -- Multifloor Designs -- Aesthetics -- Augmenting Existing Designs -- Upgrading Access Point Hardware -- Cabling -- Network Infrastructure -- Network Ports -- Power Availability -- Network Bandwidth -- IP Address Availability -- Survey Equipment -- Form Factor -- Site Survey Design Software -- Spectrum Analyzer -- Survey Types -- Predictive Survey -- Passive Survey -- Active Survey -- Survey Techniques -- Site Survey Report -- Post-Validation Survey -- Chapter 4 Wireless Security Wi-Fi -- About Information Security and Wireless Networking -- Confidentiality -- Availability -- Integrity -- Wireless Security Risks and Threats -- Denial of Service -- Malicious Code -- Social Engineering -- Signal Analysis -- Spoofing -- Rogue Access Points -- Wireless Hacking and Hackers -- Motives of Wireless Hackers -- War Driving -- Tracking War Drivers.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The Hacking Process -- Information Gathering -- Enumeration -- Compromise -- Expanding Privileges and Accessibility -- Cleaning Up the Trails -- Service Set Identifier -- Shared Key Authentication -- Open Key Authentication -- Wired Equivalent Privacy Standard -- 802.1x -- Authentication Server -- Authenticator -- Supplicant -- Extensive Authentication Protocol over Local Area Network (EAPOL) -- Remote Authentication Dial-In User Service (RADIUS) -- Extensible Authentication Protocol -- EAP-MD5 -- EAP-TLS -- EAP-TTLS -- LEAP -- PEAP -- EAP-FAST -- Wi-Fi Protected Access -- 802.11i -- Robust Secure Network (RSN) -- Transition Secure Network (TSN) -- Temporal Key Integrity Protocol -- TKIP MIC -- Advance Encryption Standard -- 802.11i System Overview -- Wi-Fi Protected Access -- Rogue Access Points Detection -- Wireless Security Tools -- Scanning Tools -- Sniffing Tools -- Hybrid Tools -- Cracking Tools -- Access Point Attacking Tools -- Wireless Security Policy Areas -- Password Policy -- Access Policy -- Rogue Access Point Policy -- Guest Access Policy -- Remote WLAN Access Policy -- Physical Security -- Wireless Monitoring and Security Incident Response -- HIPAA and Wi-Fi -- Chapter 5 Wireless Guest Services -- Sponsored, Open Access, and Self-Enrollment -- Sponsored Guest Access -- Self-Enrollment Guest Access -- Open Access -- Captive Portal Page Types -- No Registration Splash Page -- Self-Registration -- Manual Registration -- Sponsored Registration -- Supporting Infrastructure -- Revenue Generation -- Bring Your Own Device (BYOD) -- SCEP -- Endnotes -- Chapter 6 Mobile Medical Devices -- Functional Testing -- Network Testing -- Failover and Redundancy Test -- Mobile X-Ray Machines -- Medication Dispensing Systems -- IV Pumps -- Electrocardiogram Carts -- Ultrasound Devices -- Blood Gas Analyzers -- Hemodialysis Machines -- mHealth.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 7 Voice over Wi-Fi -- Why VoWi-Fi? -- The Challenges of VoWi-Fi -- Quality of Service Fundamentals -- Evolution of QoS -- The Journey of a Voice Packet -- What Happens at Phone One -- What Happens at the Access Point -- What Happens at Switch One -- What Happens at the Router -- Differentiated Services -- 802.1Q -- Anatomy of VoIP -- The Anatomy of Codecs -- Proprietary Protocols -- Wireless Arbitration -- Troubleshooting VoWi-Fi -- Roaming -- Chapter 8 Real-Time Location Services -- RTLS Technologies -- ZigBee -- Wi-Fi -- Infrared -- Ultrasound -- How RTLS Works -- Architecture -- ISO/IEC Standards -- Different Types of Transmitters -- Applications -- Asset Management -- Equipment Rentals -- Shrinkage -- Condition Monitoring -- Patient and Clinician Safety -- Infection Control -- Workflow -- RTLS Issues -- Privacy Concerns -- Challenges with Accuracy -- Maintenance and Costs -- Chapter 9 The Wireless Project Management Process -- Refining the Scope -- Scheduling and Developing Milestones -- Developing a Budget -- Quality Assurance -- Communication Strategy -- Risk Management -- Change Management -- Closure Criteria -- 1. Identify Key Stakeholders and Set up a Kickoff Meeting -- 2. Perform an RFI and RFP to Choose a Wireless Vendor -- 3. Survey Network Closets for Port Capacity and POE Availability -- 4. Perform Predictive and Onsite Wireless Survey -- 5. Develop Detailed Physical and Logical Architecture -- 6. Develop a Survey Report and Create a Cabling Bid Package -- 7. Order Hardware and Consider Lead Times on the Project Plan -- 8. Identify Third-Party Training Requirements -- 9. Stage Hardware -- 10. Oversee Installation and Turn-up of Wireless Network Using a Standard Change Management Process -- 11. Ensure that All Hardware Is Set up on the Enterprise Monitoring System -- 12. Validate Channel and Power Plan.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">13. Conduct Post-Implementation Survey and Make Modifications as Needed -- 14. Perform UAT (Unit Acceptance Testing) Using Various Form Factors of End-User Devices -- 15. Send a Series of Communications Outlining Offerings with Instructions -- 16. Develop Helpdesk Knowledge Base for Common Troubleshooting -- 17. Create a Runbook -- 18. Handoff Support to Ongoing Operations Team -- 19. Ensure that a Process is in Place for Onboarding and Certifying Wireless Devices -- Chapter 10 Support Considerations and Lifecycle -- Tool Set -- Protocol Analyzer -- Voice Analyzer -- Spectrum Analyzer -- Site Survey Software -- Performance Software -- Packet Capturing -- Wireless Intrusion Prevention Systems (WIPS) -- Wireless Network Management -- Staffing Considerations -- Vendor Neutral Training -- Software Tool Training -- Wireless Manufacturer Training -- Wireless Runbook -- Policies -- Acceptable Use -- Disaster Recovery -- Procedures -- Architecture -- Systems Lifecycle -- Routine Maintenance -- Technical Support -- Tier 1 -- Tier 2 -- Tier 3 -- Tier 4 -- Infrastructure Code Upgrade -- End-User Device Considerations -- Lifecycle and Drivers for System Upgrades -- Infrastructure Lifecycle -- Client Device Lifecycle -- Chapter 11 Emerging Trends and Technologies -- Demand for More Bandwidth and Denser Deployments -- Device Density -- Evolution of the Electronic Medical Record -- Mobile Voice and Video -- Guest Access -- Patient Engagement with Social Media -- Device Consolidation -- Shrinking Herds of Carts on Wheels (CoWs) and Workstations on Wheels (WoWs) -- Key Emerging Technologies -- IEEE 802.11ac -- Infrastructure -- Client Devices -- Design and Planning -- Policy Management and Software Defined Networking (SDN) -- The Rise of the Smart Phone -- Application Performance and Security -- IPv6 -- 802.11u/Hotspot 2.0/Passpoint -- mHealth -- Index.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. </subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">McDonald II, Douglas.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Linton, Jon.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zemke, Bob.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Earle, Aaron.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Youssef, Ali</subfield><subfield code="t">Wi-Fi Enabled Healthcare</subfield><subfield code="d">Milton : Auerbach Publishers, Incorporated,c2014</subfield><subfield code="z">9781466560406</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=7245680</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>