Welcome![Sign In][Sign Up]
Location:
Search - The 802.11 security Protocols

Search list

[matlab802.11Security

Description: Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you ll want this book beside you every step of the way.-Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in Theor y and practice of wireless security, dispelling some of the myths along the way. In do ing so, they provide you with the technical grounding r equired to think about how the rest of the book ap plies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--ba sed systems. you ll want this book beside you every step of the way.
Platform: | Size: 835584 | Author: | Hits:

[Other802.11i-2004

Description: 无限局域网标准。该标准介绍了无限局域网的安全协议-unlimited local area network standard. The standard introduced unlimited LAN security agreement
Platform: | Size: 1651712 | Author: CPlusplus | Hits:

[Communication802.11i-2004

Description: 802.11i无线安全标准2004修正版-802.11i wireless security standard in 2004 amended version
Platform: | Size: 1356800 | Author: BANQHU | Hits:

[Other802.11i-2004

Description: IEEE 802.11i-2004 Amendment to IEEE Std 802.11, 1999 Edition (Reaff 2003). IEEE Standard for Information technology--Telecommunications and information exchange between system--Local and metropolitan area networks?Specific requirements--Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications--Amendment 6: Medium Access Control (MAC) Security Enhancements
Platform: | Size: 1651712 | Author: 周金喜 | Hits:

[OtherWireless.Security.GSM.UMTS.802.dot.11

Description: 关于无线安全的一本好书,包括了二代、三代移动通信网络和无线局域网里面的安全协议和算法。-Wireless Security is a vast topic and any attempt to address all issues in a single book is a daunting task. It is almost impossible to explain each and every security algorithm that is used in wireless security in detail in a single volume. In writing this book, I have tried to strike a balance between architectural overviews and minute details. The aim of this book has been to answer questions like: How is wireless security different from security of wireline networks? How has wireless security evolved with changes in wireless networking? What is the architectural philosophy behind the design of wireless security protocols? What are the loopholes in these protocols and how can they be rectified in future designs?
Platform: | Size: 4146176 | Author: 秦中元 | Hits:

[Program docOReilly.802.11.Wireless.Networks.The.Definitive.G

Description: As a network administrator, architect, or security professional, you need to understand the capabilities, limitations, and risks associated with integrating wireless LAN technology into your current infrastructure. This practical guide provides all the information necessary to analyze and deploy wireless networks with confidence. It?s the only source that offers a full spectrum view of 802.11, from the minute details of the specification, to deployment, monitoring, and troubleshooting.
Platform: | Size: 7806976 | Author: MEONGHUN LEE | Hits:

[OtherOPNET_802.11-MAC

Description: OPNET_802.11-MAC 用opnet仿真802.11 mac协议 包含源文件,仿真文件。详细-OPNET_802.11-MAC 802.11 mac protocol with opnet simulation contains the source files, simulation files. Details
Platform: | Size: 1374208 | Author: eric | Hits:

CodeBus www.codebus.net