
Wi-Fi Security
By following this resource, corporations can go wireless and still protect mission-critical data. Top corporate security consultant Stewart Miller covers security for Windows, Linux, Macs, Palms, and other PDAs and shows how to prevent breaches caused by weak encryption protocols.
* Review security approaches for the different standards currently competing for the U.S. market
* Addresses data compro...
By following this resource, corporations can go wireless and still protect mission-critical data. Top corporate security consultant Stewart Miller covers security for Windows, Linux, Macs, Palms, and other PDAs and shows how to prevent breaches caused by weak encryption protocols.
* Review security approaches for the different standards currently competing for the U.S. market
* Addresses data compro...
