-
Lesson 4: How to use wireless IDS/IPS
In Lesson 4 of Wireless Security Lunchtime Learning, you'll walk away with an understanding of the value of wireless IDS/IPS -- even if your organization doesn't support a wireless LAN. Also learn ...10 Apr 2006
-
Wireless LANs: Coming soon to an enterprise near you
Are WLANs ready for enterprise-wide adoption? One wireless expert thinks they are.10 Apr 2006
-
Measuring ROI from Wireless LANs
More and more organizations are implementing wireless LANs with the goals of increased productivity and reduced IT and communications costs. But does a wireless LAN deliver positive ROI? The answer...10 Apr 2006
-
Overlay vs. embedded WIDS sensors
WIDSs rely on sensors to observe and forward traffic summaries to a central analysis server. Overlay WIDS use special-purpose sensors, dedicated to this monitoring task. Embedded WIDS use APs to mo...10 Apr 2006
-
To block or not to block: Rogue containment methods
Wireless network monitoring systems are quickly moving from detection alone to detection and prevention. In particular, many now provide options to "block" rogue devices, preventing wireless or wir...10 Apr 2006
-
Defeating Evil Twin attacks
Evil Twins pose a clear and present danger to wireless users on public and private WLANs. This tip describes steps that you can take to defend users against this poorly-understood attack. Learn why...10 Apr 2006
-
Lesson 3 quiz: Who goes there?
Put your new knowledge of wireless access to the test.10 Apr 2006
-
WLAN security tools: Buyers' guide for SMBs
Wireless LAN security is critical for small and midsized businesses, which are often the target of unauthorized access attempts and denial-of-service attacks.06 Apr 2006
-
Guide to Wireless Security
Guide to Wireless Security - Google06 Apr 2006
-
Wireless LAN Resource Guide
Wireless LAN Resource Guide - Google06 Apr 2006
-
Guide to Wireless Technology
Guide to Wireless Technology - Google06 Apr 2006
-
Guide to Internet Protocol
Guide to Internet Protocol - Google06 Apr 2006
-
Top Five Routing & Switching Tips
Top Five Routing & Switching Tips - Google06 Apr 2006
-
802.11 Wireless Network Site Surveying and Installation
This chapter outlines the physical logistics of installing a wireless network into a building. Concerns regarding the architecture and layout of the building are addressed, so that you can plan app...06 Apr 2006
-
Check IT List: Network appliances for small offices
As the supply and demand for network and security tools increases for small and midsized businesses, so do the options for SMB network appliances. Ed Tittel offers advice for your network setup.06 Apr 2006
-
Firewall Resource Guide
Firewall Resource Guide - Google06 Apr 2006
-
802.11 Learning Guide
802.11 Learning Guide - Google06 Apr 2006
-
Crash Course: Routers
Crash Course: Routers - Google06 Apr 2006
-
Building a wireless LAN proxy server
Our router expert, Michael Martin, walks you through building an http proxy server for a wireless LAN with a Linux base.05 Apr 2006
-
Network tool stops security threats dead in their tracks
Summary: Mu Security's new security analyzer tool puts developing products through a vulnerability torture chamber to identify zero-day threats.05 Apr 2006
Network Management Strategies for the CIO