WiFi Security
By following this resource, corporations can go wireless and still protect mission-critical data. Top corporate security consultant, Stewart Miller covers security for Windows, Linux, Macs, Palms, and other PDAs, and shows how to prevent breaches caused by weak encryption protocols. This work review...
Đã lưu trong:
Tác giả chính: | |
---|---|
Định dạng: | Sách |
Ngôn ngữ: | English |
Được phát hành: |
McGraw-Hill
2011
|
Những chủ đề: | |
Truy cập trực tuyến: | http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/26463 |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Thư viện Trường Đại học Đà Lạt |
---|
id |
oai:scholar.dlu.edu.vn:DLU123456789-26463 |
---|---|
record_format |
dspace |
spelling |
oai:scholar.dlu.edu.vn:DLU123456789-264632012-03-03T05:17:15Z WiFi Security Miller, Stewart S. Tin học By following this resource, corporations can go wireless and still protect mission-critical data. Top corporate security consultant, Stewart Miller covers security for Windows, Linux, Macs, Palms, and other PDAs, and shows how to prevent breaches caused by weak encryption protocols. This work review security approaches for the different standards currently competing for the U.S. market. It addresses data compromise, unauthorized access, and denial of service - all critical to WLAN users. It covers the 802.11 IEEE standard in regards to security, performance, and throughput. It also discusses encryption and privacy through the WEP (Wired Equivalent Privacy) protocol. 2011-11-15T02:55:49Z 2011-11-15T02:55:49Z 2003 Book 0-07-141073-2 http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/26463 en application/pdf McGraw-Hill |
institution |
Thư viện Trường Đại học Đà Lạt |
collection |
Thư viện số |
language |
English |
topic |
Tin học |
spellingShingle |
Tin học Miller, Stewart S. WiFi Security |
description |
By following this resource, corporations can go wireless and still protect mission-critical data. Top corporate security consultant, Stewart Miller covers security for Windows, Linux, Macs, Palms, and other PDAs, and shows how to prevent breaches caused by weak encryption protocols. This work review security approaches for the different standards currently competing for the U.S. market. It addresses data compromise, unauthorized access, and denial of service - all critical to WLAN users. It covers the 802.11 IEEE standard in regards to security, performance, and throughput. It also discusses encryption and privacy through the WEP (Wired Equivalent Privacy) protocol. |
format |
Book |
author |
Miller, Stewart S. |
author_facet |
Miller, Stewart S. |
author_sort |
Miller, Stewart S. |
title |
WiFi Security |
title_short |
WiFi Security |
title_full |
WiFi Security |
title_fullStr |
WiFi Security |
title_full_unstemmed |
WiFi Security |
title_sort |
wifi security |
publisher |
McGraw-Hill |
publishDate |
2011 |
url |
http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/26463 |
_version_ |
1757654521107972096 |