Download now Free registration required
Through this paper, the authors are trying to reflect the weaknesses and counter measures that are put forward until recently of the wireless security. They present a structure to help managers appreciate and review the various threats associated with the use of wireless security technology. They also discuss a number of presented solutions for countering those threats. They believe that a thorough understanding of this paper makes the non specialist reader have a complete review of wireless security and vulnerabilities associated with it.
- Format: PDF
- Size: 986.9 KB