Download now Free registration required
This white paper first explains wireless security techniques that have failed, and then provides clear recommendations for building effective security policies. Also presented are pros and cons of two architectural approaches to wireless security - a centralized approach and a distributed approach. At the end of this paper, a sample wireless security policy is provided.
- Format: PDF
- Size: 278 KB