546 pages
English

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris

Wireless Security: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors , livre ebook

-

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus
546 pages
English
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus

Description

Wireless security is the prevention of unauthorized access or damage to computers using wireless networks.


This book is your ultimate resource for Wireless Security. Here you will find the most up-to-date information, analysis, background and everything you need to know.


In easy to read chapters, with extensive references and links to get you to know all there is to know about Wireless Security right away, covering: Wireless security, Access Network Discovery and Selection Function, Ad hoc On-Demand Distance Vector Routing, Ad Hoc QoS Multicast, Ad hoc wireless network, Ad-hoc Wireless Distribution Service, Adaptive Wireless Path Protocol, Air2Web, AirSnort, Augmented Tree-based Routing, B.A.T.M.A.N., Babel (protocol), Backhaul (telecommunications), Barber's pole, Barker code, Base station, Bluetooth low energy, Body Area Network, Broadcast radiation, Buffalo AirStation, BYOA, Cantenna, Capwap, Castalia (simulator), CCKM, CCMP, Cellular data communication protocol, Cellular router, Center for Wireless Information Network Studies, Certified Wireless Network Administrator, Certified Wireless Network Expert, Certified Wireless Security Professional, Cisco Valet Routers, Cognitive radio, Communication Linking Protocol, Comparison of 802.15.4 radio modules, Contention free pollable, Contention-based protocol, Continuous phase modulation, CTIA - The Wireless Association, Daintree Networks, Danesh Net, Dash Navigation, DASH7 Alliance, DataTAC, Dedicated short-range communications, Delivery Traffic Indication Message, Detect and Avoid, Direct-sequence spread spectrum, Distributed coordination function, DrayTek Vigor 2710 Series, Dynamic frequency hopping, Dynamic single-frequency networks, Dynamic Source Routing, ExOR (wireless network protocol), Expected Transmission Count, Exposed node problem, Extensible Authentication Protocol, Fixed wireless, Frame-bursting, Fuzzy routing, Geographic routing, GloMoSim, Wireless grid, Grid fabric, Handover Keying, Hazy Sighted Link State Routing Protocol, Hidden node problem, High Capacity Data Radio, High Performance Wireless Research and Education Network, History of wireless mesh networking, HSBRA, IBurst, Infrastructure Wireless Mesh Protocol, Inssider, Intelligent Vehicular ad-hoc Network, Inter-flow interference, Wireless network interface controller, Intersymbol interference, Intra-flow interference, IP over Avian Carriers, IP-DECT, Isa100.11a, KisMAC, Kismet (software), Wireless LAN security, Legality of piggybacking, LibertyLink (wireless), LightSquared, Lightweight Extensible Authentication Protocol, Link margin, List of ad hoc routing protocols, List of deployed WiMAX networks, List of wireless router firmware projects, List of WLAN channels, Local Multipoint Distribution Service, Manhattan mobility model, Media-independent handover, Wireless Distribution System, Wireless mesh network, Mesh networking, Mesh node, Microwave Bypass, Microwave transmission, MiWi, MMARP, Mobile ad hoc network, Mobile data offloading, Mobile QoS, Mobility model, Wireless modem, MoIP, Monitor mode, MORE protocol, Motorola Canopy, Multipoint relay, National Broadband Plan (United States), Near-Term Digital Radio, Negroponte switch, Netgear, Netgear DG834 (series), NetSim, NetStumbler, Network detector, Network enumerating, NIMO (Non Interfering Multiple Output), Nintendo Wi-Fi USB Connector, ODMRP, Comparison of open source wireless drivers, Open spectrum, OpenBee, Optimized Link State Routing Protocol, Order One Network Protocol, Out-broadcasting, Packet analyzer, Personal area network, Personal Communications Network, Piggybacking (Internet access), Point-to-multipoint communication...and much more


This book explains in-depth the real drivers and workings of Wireless Security. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Wireless Security with the objectivity of experienced professionals.

Sujets

Informations

Publié par
Date de parution 24 octobre 2012
Nombre de lectures 0
EAN13 9781743048658
Langue English
Poids de l'ouvrage 29 Mo

Informations légales : prix de location à la page 0,1598€. Cette information est donnée uniquement à titre indicatif conformément à la législation en vigueur.

Extrait

  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents
Alternate Text