Email Alerts
-
Wi-Fi Security - Chapter 4
This chapter presents an assessment of wireless security with focus on the effective response to three primary issues. Tip
-
802.11 (Wi-Fi) Networking Handbook - Chapter 9
Integrating WLAN into your network infrastructure Tip
-
Know your wireless building blocks
Before you can put together a wireless networking plan for your company, you have to know what the devices and rules are. Tip
-
Identify malicious users
This tip offers some definitions of the kinds of people who could be sitting there, waiting to crack into your network. Tip
-
Migrating to 802.11g
Consumers struggling to choose between 802.11a and 802.11b now face another decision: whether and when to migrate to 802.11g. Tip
-
Securing wireless, part 2: WLAN best practices
In this article, security expert Roberta Bragg provides the steps to a more secure wireless LAN. Tip
-
How to pick wireless devices
How to pick wireless devices Tip
-
Securing wireless, part 1: No boundaries
The only thing you need to know about wireless security is that you cannot perimeter-ize it. Tip
-
WLAN security checklist
WLAN security checklist Tip
-
Choosing between 802.11a and 802.11b
Lisa focuses on the differences between 802.11a and 802.11b, and analyzes the differences and what they mean to you. Tip
Network Management Strategies for the CIO