Description: Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you ll want this book beside you every step of the way.-Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in Theor y and practice of wireless security, dispelling some of the myths along the way. In do ing so, they provide you with the technical grounding r equired to think about how the rest of the book ap plies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--ba sed systems. you ll want this book beside you every step of the way. Platform: |
Size: 835584 |
Author:秦 |
Hits:
Description: 无限局域网标准。该标准介绍了无限局域网的安全协议-unlimited local area network standard. The standard introduced unlimited LAN security agreement Platform: |
Size: 1651712 |
Author:CPlusplus |
Hits:
Description: IEEE 802.11i-2004 Amendment to IEEE Std 802.11, 1999 Edition (Reaff 2003). IEEE Standard for Information technology--Telecommunications and information exchange between system--Local and metropolitan area networks?Specific requirements--Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications--Amendment 6: Medium Access Control (MAC) Security Enhancements Platform: |
Size: 1651712 |
Author:周金喜 |
Hits:
Description: 关于无线安全的一本好书,包括了二代、三代移动通信网络和无线局域网里面的安全协议和算法。-Wireless Security is a vast topic and any attempt to address all issues in a single book
is a daunting task. It is almost impossible to explain each and every security algorithm
that is used in wireless security in detail in a single volume. In writing this book, I
have tried to strike a balance between architectural overviews and minute details. The
aim of this book has been to answer questions like: How is wireless security different
from security of wireline networks? How has wireless security evolved with changes
in wireless networking? What is the architectural philosophy behind the design of
wireless security protocols? What are the loopholes in these protocols and how can
they be rectified in future designs? Platform: |
Size: 4146176 |
Author:秦中元 |
Hits:
Description: As a network administrator, architect, or security professional, you need to understand
the capabilities, limitations, and risks associated with integrating wireless LAN
technology into your current infrastructure. This practical guide provides all the
information necessary to analyze and deploy wireless networks with confidence. It?s the
only source that offers a full spectrum view of 802.11, from the minute details of the
specification, to deployment, monitoring, and troubleshooting. Platform: |
Size: 7806976 |
Author:MEONGHUN LEE |
Hits: