Date Added: May 2013
Through this paper, the authors are trying to reflect the weaknesses and counter measures that are put forward until recently of the wireless security. They present a structure to help managers appreciate and review the various threats associated with the use of wireless security technology. They also discuss a number of presented solutions for countering those threats. They believe that a thorough understanding of this paper makes the non specialist reader have a complete review of wireless security and vulnerabilities associated with it.