WiFi Security
By following this resource, corporations can go wireless and still protect mission-critical data. Top corporate security consultant, Stewart Miller covers security for Windows, Linux, Macs, Palms, and other PDAs, and shows how to prevent breaches caused by weak encryption protocols. This work review...
Lưu vào:
Tác giả chính: | |
---|---|
Định dạng: | Sách |
Ngôn ngữ: | English |
Thông tin xuất bản: |
McGraw-Hill
2011
|
Chủ đề: | |
Truy cập trực tuyến: | http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/26463 |
Từ khóa: |
Thêm từ khóa bạn đọc
Không có từ khóa, Hãy là người đầu tiên gắn từ khóa cho biểu ghi này!
|
id |
dlu-DLU123456789-26463 |
---|---|
record_format |
dspace |
spelling |
dlu-DLU123456789-264632012-03-03T05:17:15Z WiFi Security Miller, Stewart S. Tin học By following this resource, corporations can go wireless and still protect mission-critical data. Top corporate security consultant, Stewart Miller covers security for Windows, Linux, Macs, Palms, and other PDAs, and shows how to prevent breaches caused by weak encryption protocols. This work review security approaches for the different standards currently competing for the U.S. market. It addresses data compromise, unauthorized access, and denial of service - all critical to WLAN users. It covers the 802.11 IEEE standard in regards to security, performance, and throughput. It also discusses encryption and privacy through the WEP (Wired Equivalent Privacy) protocol. 2011-11-15T02:55:49Z 2011-11-15T02:55:49Z 2003 Book 0-07-141073-2 http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/26463 en application/pdf McGraw-Hill |
institution |
Trường Đại học Đà Lạt |
collection |
DSpace |
language |
English |
topic |
Tin học |
spellingShingle |
Tin học Miller, Stewart S. WiFi Security |
description |
By following this resource, corporations can go wireless and still protect mission-critical data. Top corporate security consultant, Stewart Miller covers security for Windows, Linux, Macs, Palms, and other PDAs, and shows how to prevent breaches caused by weak encryption protocols. This work review security approaches for the different standards currently competing for the U.S. market. It addresses data compromise, unauthorized access, and denial of service - all critical to WLAN users. It covers the 802.11 IEEE standard in regards to security, performance, and throughput. It also discusses encryption and privacy through the WEP (Wired Equivalent Privacy) protocol. |
format |
Book |
author |
Miller, Stewart S. |
author_facet |
Miller, Stewart S. |
author_sort |
Miller, Stewart S. |
title |
WiFi Security |
title_short |
WiFi Security |
title_full |
WiFi Security |
title_fullStr |
WiFi Security |
title_full_unstemmed |
WiFi Security |
title_sort |
wifi security |
publisher |
McGraw-Hill |
publishDate |
2011 |
url |
http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/26463 |
work_keys_str_mv |
AT millerstewarts wifisecurity |
_version_ |
1768613587673153536 |