Books on the topic 'Wireless LAN Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Wireless LAN Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
How secure is your wireless network?: Safeguarding your Wi-Fi- LAN. Upper Saddle River, NJ: Prentice Hall PTR, 2004.
Find full textF, Ransome James, ed. Wireless operational security. Amsterdam: Elsevier Digital Press, 2004.
Find full textWright, Joshua. Hacking Exposed Wireless: Wireless security secrets & solutions. 2nd ed. New York, USA: McGraw-Hill, 2010.
Find full textPeikari, Cyrus. Maximum Wireless Security. Upper Saddle River: Pearson Education, 2005.
Find full textWrightson, Tyler. Wireless network security: A beginner's guide. New York: McGraw-Hill, 2012.
Find full textPetros, Mouchtaris, and Wiley online library, eds. Security for wireless ad hoc networks. Hoboken, N.J: Wiley-Interscience, 2007.
Find full textEarle, Aaron E. Wireless security handbook: Aaron E. Earle. Boca Raton, FL: Taylor & Francis, 2005.
Find full textHolt, Alan. 802.11 wireless networks: Security and analysis. London: Springer, 2010.
Find full textTran, Khai. SonicWALL secure wireless network integrated solutions guide. Rockland, Mass: Syngress, 2008.
Find full textBulletproof wireless security: GSM, UMTS, 802.11 and ad hoc security. Amsterdam: Newnes, 2005.
Find full textGeier, Jim. Implementing 802.1X Security Solutions for Wired and Wireless Networks. New York: John Wiley & Sons, Ltd., 2008.
Find full textWall, David. Managing and securing a Cisco structured wireless-aware network. Rockwell, MA: Syngress, 2004.
Find full textMišić, Jelena. Wireless personal area networks: Performance, interconnections and security with IEEE 802.15.4. Chichester, England: Wiley, 2008.
Find full textMišić, Jelena. Wireless personal area networks: Performance, interconnections and security with IEEE 802.15.4. Chichester, West Sussex, England: Wiley, 2007.
Find full textMišić, Jelena. Wireless personal area networks: Performance, interconnections and security with IEEE 802.15.4. Chichester, England: Wiley, 2008.
Find full textT, Davis Peter, ed. Hacking wireless networks for dummies. Hoboken, N.J: Wiley, 2005.
Find full textBeaver, Kevin. Hacking Wireless Networks For Dummies. New York: John Wiley & Sons, Ltd., 2005.
Find full textDeploying secure 802.11 wireless networks with Microsoft Windows. Redmond, Wash: Microsoft Press, 2004.
Find full textKhan, Jahanzeb. Building Secure Wireless Networks with 802.11. New York: John Wiley & Sons, Ltd., 2003.
Find full textAnis, Khwaja, ed. Building secure wireless networks with 802.11. Indianapolis, Ind: Wiley Pub., 2003.
Find full textXian dai wu xian wang luo ji shu yu an quan: Xiandai wuxian wangluo jishu yu anquan. Beijing Shi: Zhongguo yuan zi neng chu ban chuan mei you xian gong si, 2011.
Find full textConsorzio Nazionale Interuniversitario per le Telecomunicazioni, IEEE South and Central Italy Section, IEEE Communications Society, and Tirrenia International Workshop on Digital Communications (18th : 2007 : University of Padova, Italy), eds. Wireless Communications: 2007 CNIT Thyrrenian Symposium. New York: Springer Science + Business Media, 2008.
Find full textRaymond, Greenlaw, ed. Secure roaming in 802.11 networks. Boston, MA: Newnes, 2007.
Find full textL, Antonakos James, ed. Computer networking from LANs to WANs: Hardware, software and security. Boston, MA: Course Technology, Cengage Learning, 2010.
Find full textGregg, Michael. Build your own security lab: A field guide for network testing. Indianapolis, IN: Wiley, 2008.
Find full textGregg, Michael. Build your own security lab: A field guide for network testing. Indianapolis, IN: Wiley, 2008.
Find full textGregg, Michael. Build your own security lab: A field guide for network testing. Indianapolis, IN: Wiley, 2008.
Find full textWu xian wang luo yu yi dong tong xin de zi yuan, yi dong yu an quan guan li: Resource, mobility, and security management in wireless networks and mobile communications. Beijing Shi: Dian zi gong ye chu ban she, 2008.
Find full textWireless communications and networking: An introduction. Amsterdam: Morgan Kaufmann, 2007.
Find full textTesting 802.11 WLANs: Techniques for maximum performance. Amsterdam: Elsevier Newnes, 2007.
Find full textInc, ebrary, ed. Picture yourself networking your home or small office: Step-by-step instruction for designing, installing, and managing a wired or wireless computer network. Boston, Mass: Course Technology, 2009.
Find full textMing yue gong zuo shi, ed. Hei ke gong fang cong ru men dao jing tong: Shou ji an quan pian, quan xin sheng ji ban. Beijing Shi: Beijing da xue chu ban she, 2016.
Find full textA, Arbaugh William, ed. Real 802.11 security: Wi-Fi protected access and 802.11i. Boston, MA: Addison-Wesley, 2004.
Find full textSankar, Krishna, Sri Sundaralingam, Darrin Miller, and Andrew Balinsky. Cisco Wireless LAN Security. Cisco Press, 2004.
Find full textHeld, Gilbert. Securing Wireless LANs: A Practical Guide for Network Managers, LAN Administrators and the Home Office User. Wiley, 2003.
Find full textBarken, Lee. How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN. Prentice Hall PTR, 2003.
Find full textBarken, Lee. How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN. Prentice Hall PTR, 2003.
Find full textReynolds, Kevin T. An IT and Security Comparison Decision Support System for Wireless LANs: 802.11 infosec and WiFi LAN comparison. Universal Publishers, 2004.
Find full textYŏnʼguwŏn, Hanʼguk Chŏnja Tʻongsin, and Korea (South) Chŏngbo Tʻongsinbu, eds. IEEE 802.11 kiban ŭi musŏn LAN chŏngbo poho kisul kaebal e kwanhan yŏnʼgu =: A study on the development of the security technology on the IEEE 802.11 wireless LAN. [Taejŏn Kwangyŏksi]: ETRI, 2005.
Find full textMunegowda, Keshava. Design and Implementation of WLAN Authentication and Security: Building Secure Wireless LAN by EAP-MD5, EAP-TLS and EAP-TTLS protocols. LAP LAMBERT Academic Publishing, 2010.
Find full textPrasad, Anand R. Wireless Lans: Protocols, Security & Deployment. Delft Univ Pr, 2003.
Find full textEarle, Aaron E. Wireless Security Handbook. Auerbach Publishers, Incorporated, 2005.
Find full text