IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Wireless Security

Wireless Security
View Sample PDF
Author(s): Faisal Kaleem (Florida International University, USA)and Kang K. Yen (Florida International University, USA)
Copyright: 2012
Pages: 29
Source title: Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances
Source Author(s)/Editor(s): Te-Shun Chou (East Carolina University, USA)
DOI: 10.4018/978-1-61350-507-6.ch002

Purchase

View Wireless Security on the publisher's website for pricing and purchasing information.

Abstract

The purpose of this chapter is to educate individuals about the inherent security risks and vulnerabilities of common and emerging wireless technologies and to provide them with some of the best practices used in securing or minimizing these associated risks.

Related Content

Chirag Sharma, Amanpreet Kaur, Priyanka Datta, Yonis Gulzar. © 2025. 30 pages.
M. Johnpaul, Raam Sai Bharadwaj Miryala, Marica Mazurek, G. Jayaprakashnarayana, Ramesh Kumar Miryala. © 2025. 28 pages.
Jatin Arora, Gaganpreet Kaur, Monika Sethi, Saravjeet Singh. © 2025. 20 pages.
L. A. Anto Gracious, L. Sudha, B. Chitra, Gaganpreet Kaur, V. Sathya, P. Kabitha, R. Siva Subramanian. © 2025. 28 pages.
Bhavik Singla, Anuj Kumar Jain, Gaganpreet Kaur, Nitin Jain, Vishal Jain. © 2025. 28 pages.
P. Vijayalakshmi, K. Subashini, B. Selvalakshmi, G. Sudhakar, Anand Anbalagan, N. Bharathiraja, Gaganpreet Kaur. © 2025. 22 pages.
Djamel Saba, Abdelkader Hadidi. © 2025. 28 pages.
Body Bottom