By following this resource, corporations can go wireless and still protect mission-critical data. Top corporate security consultant, Stewart Miller covers security for Windows, Linux, Macs, Palms, and other PDAs, and shows how to prevent breaches caused by weak encryption protocols. This work review security approaches for the different standards currently competing for the U.S. market. It addresses data compromise, unauthorized access, and denial of service - all critical to WLAN users. It covers the 802.11 IEEE standard in regards to security, performance, and throughput. It also discusses encryption and privacy through the WEP (Wired Equivalent Privacy) protocol.
评分
评分
评分
评分
本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度,google,bing,sogou 等
© 2025 qciss.net All Rights Reserved. 小哈图书下载中心 版权所有