Email Alerts
-
Wireless network security best practices
Don't let your wireless LAN (WLAN) jeopardize your corporate networks, servers and data. In this guide, you'll discover how to mitigate the risks WLAN pose and learn how to perform vulnerability assessments to manage potential risks. Best Practices Guide
-
Wireless network security -- Chapter 8 of 'Essential Computer Security'
Starting with a brief overview of the wireless protocols and technology, this chapter will cover what's required to secure your own home wireless network to keep unauthorized users out of your network. This chapter will also examine the security prec... Chapter Download
-
Cisco WLAN design best practices
Wireless LAN (WLAN) technology has built-in security features, but a one-size-fits-all approach won't ensure adequate security for your organization. This tip provides best practices for designing your security architecture, including user community ... Tip
-
Wireless connections with ad hoc networks
Ad hoc wireless networking in Windows Vista with the IPv6 protocol has its risks, but it also has several built-in security mechanisms. In this tip, Brien Posey explains how these security features help counteract some risks of wireless networks. Tip
-
Wireless technology: Five myths debunked
Cisco, along with Forrester Research, recently issued a report calling most wireless LAN fears mere myths, and a campus-wide, all-wireless deployment appears to prove that theory. Article
-
Access on the road: Putting hotspot security to the test
Lisa Phifer and Craig Mathias outline a number of steps that your traveling employees can take to protect themselves while working in public-access networks. Research Report
-
Set up an ad hoc WiFi network
What if you wanted to do pretty much everything you can do on a network, but didn't have a router? You can set up an ad hoc network, in which you can connect on a peer-to-peer basis with other computers and PDAs. You don't need any extra software; th... Tip
-
Wireless network security testing: Step 1: Building the right tools
The abundance of wireless devices is making wireless networks -- both authorized and unauthorized -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Security testing expert Kevin Beaver covers the t... Step-by-Step Guide
-
Wireless network security testing: Step 3: Demonstrating threats
The abundance of wireless devices is making wireless networks -- both authorized and unauthorized -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Step-by-Step Guide
-
Wireless network security testing
The abundance of wireless devices is making wireless networks -- both authorized and unauthorized -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Security testing expert Kevin Beaver covers the t... Step-by-Step Guide
Network Management Strategies for the CIO