Categories

Categories

Additional Information

Additional Information
  • Home

Account Navigation

Account Navigation

Currency - All prices are in AUD

Currency - All prices are in AUD
 Loading... Please wait...
  • Call us on (US) 1.877.772.2536 or (AU) 07 32052596
  • My Account
The Art of Service

Categories

Categories

Wireless Security: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

$39.95

Wireless Security: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

$39.95

Product Description

Wireless security is the prevention of unauthorized access or damage to computers using wireless networks.This book is your ultimate resource for Wireless Security. Here you will find the most up-to-date information, analysis, background and everything you need to know.This book explains in-depth the real drivers and workings of Wireless Security. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Wireless Security with the objectivity of experienced professionals.

Wireless security is the prevention of unauthorized access or damage to computers using wireless networks.

This book is your ultimate resource for Wireless Security. Here you will find the most up-to-date information, analysis, background and everything you need to know.

In easy to read chapters, with extensive references and links to get you to know all there is to know about Wireless Security right away, covering: Wireless security, Access Network Discovery and Selection Function, Ad hoc On-Demand Distance Vector Routing, Ad Hoc QoS Multicast, Ad hoc wireless network, Ad-hoc Wireless Distribution Service, Adaptive Wireless Path Protocol, Air2Web, AirSnort, Augmented Tree-based Routing, B.A.T.M.A.N., Babel (protocol), Backhaul (telecommunications), Barber's pole, Barker code, Base station, Bluetooth low energy, Body Area Network, Broadcast radiation, Buffalo AirStation, BYOA, Cantenna, Capwap, Castalia (simulator), CCKM, CCMP, Cellular data communication protocol, Cellular router, Center for Wireless Information Network Studies, Certified Wireless Network Administrator, Certified Wireless Network Expert, Certified Wireless Security Professional, Cisco Valet Routers, Cognitive radio, Communication Linking Protocol, Comparison of 802.15.4 radio modules, Contention free pollable, Contention-based protocol, Continuous phase modulation, CTIA – The Wireless Association, Daintree Networks, Danesh Net, Dash Navigation, DASH7 Alliance, DataTAC, Dedicated short-range communications, Delivery Traffic Indication Message, Detect and Avoid, Direct-sequence spread spectrum, Distributed coordination function, DrayTek Vigor 2710 Series, Dynamic frequency hopping, Dynamic single-frequency networks, Dynamic Source Routing, ExOR (wireless network protocol), Expected Transmission Count, Exposed node problem, Extensible Authentication Protocol, Fixed wireless, Frame-bursting, Fuzzy routing, Geographic routing, GloMoSim, Wireless grid, Grid fabric, Handover Keying, Hazy Sighted Link State Routing Protocol, Hidden node problem, High Capacity Data Radio, High Performance Wireless Research and Education Network, History of wireless mesh networking, HSBRA, IBurst, Infrastructure Wireless Mesh Protocol, Inssider, Intelligent Vehicular ad-hoc Network, Inter-flow interference, Wireless network interface controller, Intersymbol interference, Intra-flow interference, IP over Avian Carriers, IP-DECT, Isa100.11a, KisMAC, Kismet (software), Wireless LAN security, Legality of piggybacking, LibertyLink (wireless), LightSquared, Lightweight Extensible Authentication Protocol, Link margin, List of ad hoc routing protocols, List of deployed WiMAX networks, List of wireless router firmware projects, List of WLAN channels, Local Multipoint Distribution Service, Manhattan mobility model, Media-independent handover, Wireless Distribution System, Wireless mesh network, Mesh networking, Mesh node, Microwave Bypass, Microwave transmission, MiWi, MMARP, Mobile ad hoc network, Mobile data offloading, Mobile QoS, Mobility model, Wireless modem, MoIP, Monitor mode, MORE protocol, Motorola Canopy, Multipoint relay, National Broadband Plan (United States), Near-Term Digital Radio, Negroponte switch, Netgear, Netgear DG834 (series), NetSim, NetStumbler, Network detector, Network enumerating, NIMO (Non Interfering Multiple Output), Nintendo Wi-Fi USB Connector, ODMRP, Comparison of open source wireless drivers, Open spectrum, OpenBee, Optimized Link State Routing Protocol, Order One Network Protocol, Out-broadcasting, Packet analyzer, Personal area network, Personal Communications Network, Piggybacking (Internet access), Point-to-multipoint communication...and much more.

This book explains in-depth the real drivers and workings of Wireless Security. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Wireless Security with the objectivity of experienced professionals.

Product Reviews

Find Similar Products by Category