Description: Wireless Security is a vast topic and any attempt to address all issues in a single book
is a daunting task. It is almost impossible to explain each and every security algorithm
that is used in wireless security in detail in a single volume. Platform: |
Size: 2599101 |
Author:yeahelton@hotmail.com |
Hits:
Description: Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you ll want this book beside you every step of the way.-Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in Theor y and practice of wireless security, dispelling some of the myths along the way. In do ing so, they provide you with the technical grounding r equired to think about how the rest of the book ap plies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--ba sed systems. you ll want this book beside you every step of the way. Platform: |
Size: 835584 |
Author:秦 |
Hits:
Description: 无线智能安防系统的方案,可以给大家做安防的人有一些设计经验的分享。-Wireless Intelligent Security Systems program, you can give us security people do have some design experience-sharing. Platform: |
Size: 246784 |
Author:吕海安 |
Hits:
Description: 无线安全系列的一本好书,国外经典教材,值得一看-Wireless security series of a good book, a classic foreign materials, worth a visit Platform: |
Size: 4512768 |
Author:cuiyanzhe |
Hits:
Description: wireless security book which can be fruitful for guys who is studying courses in security Platform: |
Size: 4450304 |
Author:zahid |
Hits:
Description: 关于无线安全的一本好书,包括了二代、三代移动通信网络和无线局域网里面的安全协议和算法。-Wireless Security is a vast topic and any attempt to address all issues in a single book
is a daunting task. It is almost impossible to explain each and every security algorithm
that is used in wireless security in detail in a single volume. In writing this book, I
have tried to strike a balance between architectural overviews and minute details. The
aim of this book has been to answer questions like: How is wireless security different
from security of wireline networks? How has wireless security evolved with changes
in wireless networking? What is the architectural philosophy behind the design of
wireless security protocols? What are the loopholes in these protocols and how can
they be rectified in future designs? Platform: |
Size: 4146176 |
Author:秦中元 |
Hits:
Description: O Reilly出版的有关802.11无线网络安全方面的权威著作,是研究无线网络安全技术人员重要的参考书籍-Reilly published on 802.11 wireless network security authority of the book is to study the wireless network security and technical personnel an important reference book Platform: |
Size: 835584 |
Author:matt |
Hits:
Description: Managing Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions. Platform: |
Size: 5405696 |
Author:kinomira |
Hits:
Description: As a network administrator, architect, or security professional, you need to understand
the capabilities, limitations, and risks associated with integrating wireless LAN
technology into your current infrastructure. This practical guide provides all the
information necessary to analyze and deploy wireless networks with confidence. It?s the
only source that offers a full spectrum view of 802.11, from the minute details of the
specification, to deployment, monitoring, and troubleshooting. Platform: |
Size: 7806976 |
Author:MEONGHUN LEE |
Hits:
Description: This project aimed to develop a wireless system to detect and allow only the authorized persons. The system was based on Radio Frequency Identification (RFID) technology and consists of a passive RFID tag. The passive micro transponder tag collects power from the 125 KHz magnetic field generated by the base station, gathers information about the Tag ID and sends this information to the base station. The base station receives, decodes and checks the information available in its Database and Manchester code was used to send those information. The system performed as desired with a 10cm diameter antenna attached to the transponder. The Base Station is built by using the Popular 8051 family Microcontroller. It gets the tag ID and if the tag ID is stored in its memory then the microcontroller will allow the person inside.
RFID Reader Module, are also called as interrogators. Platform: |
Size: 111616 |
Author:Binu |
Hits: