How to secure an office wireless network

D Pollino - Network Security, 2002 - Elsevier
Hackers have got a new trick and its worrying organizations with wireless networks. With
numerous reports of user identities and passwords being grabbed out of thin air, the so …

Working without a net.(Computer Security)

D Gonzalez - Security Management, 2002 - go.gale.com
IN EVERY AIRPORT WAITING LOUNGE, overpriced coffee shop, and trendy restaurant, you
can see them huddled over glowing electronic devices. They are the mobile workers …

Wireless Network Security: Challenges, Threats and Solutions. A Critical Review

L Kibona, H Ganame - 2018 - philpapers.org
Wireless security is the avoidance of unlawful access or impairment to computers using
wireless networks. Securing wireless network has been a research in the past two decades …

[图书][B] How to cheat at securing a wireless network

C Hurley, L Barken - 2006 - books.google.com
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless
networks are the most difficult to secure and are often the favorite target of intruders. This …

[PDF][PDF] Enhancing Wireless LAN Security: A Comprehensive Analysis on Threatsand Vulnerabilities

BA Gorli, RR Baddam, GC Talasila - 2023 - academia.edu
These days, wireless LANs are found everywhere—from large corporate networks to homes-
because they are simple to set up, convenient for employees, don't require expensive wiring …

[图书][B] Guide to wireless network security

JR Vacca - 2006 - books.google.com
1. INTRODUCTION With the increasing deployment of wireless networks (802. 11
architecture) in enterprise environments, IT enterprises are working to implement security …

Mobile security risks: ever evolving

B Potter - Network Security, 2007 - Elsevier
Whether we want it or not, users are continuing to embrace the trend towards more mobile
computing. The infrastructure for a truly mobile work culture has finally arrived. WiFi is …

[图书][B] Security for Mobile Networks and Platforms (Artech House Universal Personal Communications)

S Aissi, N Dabbous, AR Prasad - 2006 - dl.acm.org
Let me start by noting, even at the expense of sounding cliché, that wireless communications
technologies are an increasingly important component of our lives. Thus, it is vital that these …

Managing mobile security: How are we doing?

A Goode - Network Security, 2010 - Elsevier
The latest mobile phones, such as the iPhone and Google's Android-based Nexus One, are
changing the way that we do business. Company-confidential information is being both …

[引用][C] Wireless security attacks and defenses

J Burke, B Hartselle, B Kneuven, B Morgan - Window Security, 2006