HackNotes Network Security Portable Reference
HackNotes Network Security Portable Reference
Wireless Security Handbook
Security+ Guide to Network Security Fundamentals
Security+ Guide to Network Security Fundamentals
Technology Innovation and the Policy Vacuum: A Call for Ethics, Norms, and Laws to Fill the Void
International Journal of Technoethics
Incident-centered information security: Managing a strategic balance between prevention and response
Information and Management
Hi-index | 0.00 |
Mobile computing is evolving at a rapid pace with 802.11 networks; the fuzzy boundaries make it easy for intruders to intercept the radio signals. War driving was performed along highways; the resulting packet analysis is explained to show how easy some security attacks can be. An elaboration is done on a host of wireless security attacks that leads to the discussion of secure wireless network design, along with some network security simulation. The paper concludes with a list of security recommendations.