By following this resource, corporations can go wireless and still protect mission-critical data. Top corporate security consultant, Stewart Miller covers security for Windows, Linux, Macs, Palms, and other PDAs, and shows how to prevent breaches caused by weak encryption protocols. This work review security approaches for the different standards currently competing for the U.S. market. It addresses data compromise, unauthorized access, and denial of service - all critical to WLAN users. It covers the 802.11 IEEE standard in regards to security, performance, and throughput. It also discusses encryption and privacy through the WEP (Wired Equivalent Privacy) protocol.
評分
評分
評分
評分
本站所有內容均為互聯網搜索引擎提供的公開搜索信息,本站不存儲任何數據與內容,任何內容與數據均與本站無關,如有需要請聯繫相關搜索引擎包括但不限於百度,google,bing,sogou 等
© 2025 qciss.net All Rights Reserved. 小哈圖書下載中心 版权所有