By following this resource, corporations can go wireless and still protect mission-critical data. Top corporate security consultant Stewart Miller covers security for Windows, Linux, Macs, Palms, and other PDAs and shows how to prevent breaches caused by weak encryption protocols.
* Review security approaches for the different standards currently competing for the U.S. market
* Addresses data compromise, unauthorized access, and denial of service--all critical to WLAN users
* Covers the 802.11 IEEE standard in regards to security, performance, and throughput
* Discusses encryption and privacy through the WEP (Wired Equivalent Privacy) protocol
- Publication Date:
- 12 / 02 / 2003