Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
802.11 Wireless Networks: The Definitive Guide
802.11 Wireless Networks: The Definitive Guide
802.11 Security
How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN
How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Hacking Exposed: Network Security Secrets and Solutions, Fourth Edition
Hacking Exposed: Network Security Secrets and Solutions, Fourth Edition
The Wireless Networking Starter Kit, Second Edition
The Wireless Networking Starter Kit, Second Edition
Weaknesses in the temporal key hash of WPA
ACM SIGMOBILE Mobile Computing and Communications Review
International Journal of Mobile Communications
Wireless Cyber Assets Discovery Visualization
VizSec '08 Proceedings of the 5th international workshop on Visualization for Computer Security
Wireless honeypots: survey and assessment
Proceedings of the 2009 conference on Information Science, Technology and Applications
Analyzing uncertainty in TG protection graphs with TG/MC
Journal of Computer Security
Improved security in IEEE 802.11 wireless LANs
DNCOCO'06 Proceedings of the 5th WSEAS international conference on Data networks, communications and computers
Hi-index | 4.10 |
Hackers can decrypt and read data on a wireless link protected by built-in WEP encryption, and they may even be able to access the data on a wired network through a Wi-Fi access point. The authors assess Wi-Fi network security in one city, analyze alternative security techniques, and suggest ways to secure such networks.