Wireless security

IntroductionWLANWLAN Basic PrinciplesIEEE 802.11 OverviewWireless FidelityWMANKey TerminologyArchitecture and ComponentsSecurity RequirementsRecent DevelopmentsApplicationsChecklistPDAsOther Wireless TechnologiesHardware ComponentsStandardsConfigurationSecurity AspectsChecklistMobile PhonesContextBa...

Full description

Bibliographic Details
Main Author: Osterhage, Wolfgang
Format: eBook
Language:English
Published: Boca Raton, Fla. CRC Press 2011
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02405nmm a2200457 u 4500
001 EB002066760
003 EBX01000000000000001206850
005 00000000000000.0
007 cr|||||||||||||||||||||
008 220922 ||| eng
020 |a 9781439896266 
020 |a 1439896267 
050 4 |a TK5103.2 
100 1 |a Osterhage, Wolfgang 
245 0 0 |a Wireless security  |c Wolfgang Osterhage 
260 |a Boca Raton, Fla.  |b CRC Press  |c 2011 
300 |a xvii, 212 pages 
505 0 |a Includes bibliographical references and index 
505 0 |a 1. Introduction -- 2. WLAN -- 3. PDAs -- 4. Mobile phones -- 5. Bluetooth -- 6. Infrared -- 7. Security policy 
653 |a COMPUTERS / Internet / Security / bisacsh 
653 |a COMPUTERS / Networking / Security / bisacsh 
653 |a Réseaux locaux sans fil / Sécurité / Mesures 
653 |a Wireless LANs / Security measures / fast 
653 |a Wireless LANs / Security measures 
653 |a Transmission sans fil / Sécurité / Mesures 
653 |a Radiocommunications mobiles / Sécurité / Mesures 
653 |a Mobile communication systems / Security measures 
653 |a Wireless communication systems / Security measures / fast 
653 |a Wireless communication systems / Security measures 
653 |a COMPUTERS / Security / General / bisacsh 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
776 |z 1578087686 
776 |z 9781439896266 
776 |z 9781578087686 
776 |z 1439896267 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781578087686/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 384 
082 0 |a 005.8 
520 |a IntroductionWLANWLAN Basic PrinciplesIEEE 802.11 OverviewWireless FidelityWMANKey TerminologyArchitecture and ComponentsSecurity RequirementsRecent DevelopmentsApplicationsChecklistPDAsOther Wireless TechnologiesHardware ComponentsStandardsConfigurationSecurity AspectsChecklistMobile PhonesContextBasic PrinciplesOperating SystemsServicesMobile Phones and WLANThreats and ProtectionSpecial Case BlackberriesSmart PhonesSecurity CheckDirectiveChecklistBluetoothIntroductionTechnical BasicsConfigurationSecurity AspectsThe FutureChecklistInfra RedBackgroundIrDAApplicationsSecurity AspectsChecklistSecurity PolicyIntroductionScopeInformation and Communication SecurityPhysical SecurityDocumentationWireless SecuritySummary