WiFi Security

By following this resource, corporations can go wireless and still protect mission-critical data. Top corporate security consultant, Stewart Miller covers security for Windows, Linux, Macs, Palms, and other PDAs, and shows how to prevent breaches caused by weak encryption protocols. This work review...

Mô tả chi tiết

Lưu vào:
Hiển thị chi tiết
Tác giả chính: Miller, Stewart S.
Định dạng: Sách
Ngôn ngữ:English
Thông tin xuất bản: McGraw-Hill 2011
Chủ đề:
Truy cập trực tuyến:http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/26463
Từ khóa: Thêm từ khóa bạn đọc
Không có từ khóa, Hãy là người đầu tiên gắn từ khóa cho biểu ghi này!
id dlu-DLU123456789-26463
record_format dspace
spelling dlu-DLU123456789-264632012-03-03T05:17:15Z WiFi Security Miller, Stewart S. Tin học By following this resource, corporations can go wireless and still protect mission-critical data. Top corporate security consultant, Stewart Miller covers security for Windows, Linux, Macs, Palms, and other PDAs, and shows how to prevent breaches caused by weak encryption protocols. This work review security approaches for the different standards currently competing for the U.S. market. It addresses data compromise, unauthorized access, and denial of service - all critical to WLAN users. It covers the 802.11 IEEE standard in regards to security, performance, and throughput. It also discusses encryption and privacy through the WEP (Wired Equivalent Privacy) protocol. 2011-11-15T02:55:49Z 2011-11-15T02:55:49Z 2003 Book 0-07-141073-2 http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/26463 en application/pdf McGraw-Hill
institution Trường Đại học Đà Lạt
collection DSpace
language English
topic Tin học
spellingShingle Tin học
Miller, Stewart S.
WiFi Security
description By following this resource, corporations can go wireless and still protect mission-critical data. Top corporate security consultant, Stewart Miller covers security for Windows, Linux, Macs, Palms, and other PDAs, and shows how to prevent breaches caused by weak encryption protocols. This work review security approaches for the different standards currently competing for the U.S. market. It addresses data compromise, unauthorized access, and denial of service - all critical to WLAN users. It covers the 802.11 IEEE standard in regards to security, performance, and throughput. It also discusses encryption and privacy through the WEP (Wired Equivalent Privacy) protocol.
format Book
author Miller, Stewart S.
author_facet Miller, Stewart S.
author_sort Miller, Stewart S.
title WiFi Security
title_short WiFi Security
title_full WiFi Security
title_fullStr WiFi Security
title_full_unstemmed WiFi Security
title_sort wifi security
publisher McGraw-Hill
publishDate 2011
url http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/26463
work_keys_str_mv AT millerstewarts wifisecurity
_version_ 1768613587673153536