Khan, 2012 - Google Patents
Managing Wireless Security in an OrganizationKhan, 2012
View PDF- Document ID
- 12193583372095771940
- Author
- Khan M
- Publication year
- Publication venue
- International Journal of Scientific & Technology Research
External Links
Snippet
The adoption of wireless mobile computing solutions has been of benefit to government institutions, commerce and learning institutions among others. This is because of the higher customer satisfaction and higher productivity that have been made possible. A wireless …
- 230000005540 biological transmission 0 abstract description 4
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Karygiannis et al. | Wireless Network Security:. | |
| Dantu et al. | EAP methods for wireless networks | |
| Feng | Wireless LAN security issues and solutions | |
| Radivilova et al. | Test for penetration in Wi-Fi network: Attacks on WPA2-PSK and WPA2-enterprise | |
| Zahur et al. | Wireless LAN security and laboratory designs | |
| Al Naamany et al. | IEEE 802. 11 wireless LAN security overview | |
| Erten et al. | A layered security architecture for corporate 802.11 wireless networks | |
| Suroto | WLAN security: threats and countermeasures | |
| Fatani et al. | Awareness toward wireless security policy: Case study of International Islamic University Malaysia | |
| Li et al. | Encryption as an effective tool in reducing wireless LAN vulnerabilities | |
| Khan | Managing Wireless Security in an Organization | |
| Efe et al. | Wi-fi security analysis for E&M-Government applications | |
| Gu et al. | Wireless LAN attacks and vulnerabilities | |
| Rowan | Negotiating wifi security | |
| Bodhe et al. | Wireless LAN security attacks and CCM protocol with some best practices in deployment of services | |
| Issac et al. | War driving and WLAN security issues—attacks, security design and remedies | |
| Chan et al. | Analysis of IEEE 802.11 b wireless security for university wireless LAN design | |
| Nguyen | Wireless Network Security: A Guide for Small and Medium Premises | |
| Scarfone et al. | Wireless Network Security for IEEE 802.11 a/b/g and Bluetooth (DRAFT) | |
| Chatzinotas et al. | Securing m-government services: The case of agroportal | |
| Orukpe et al. | Computer security and privacy in wireless local area network in Nigeria | |
| PETRICĂ | A Study on Password Strength in Wireless Encryption Protocols | |
| Chakraborty et al. | An Extensive Review of Wireless Local Area Network Security Standards | |
| Farik et al. | Recurrent Security Gaps In 802.11 ac Routers | |
| Osterhage | Wireless security |