Wireless Security and Privacy shows how to build security into a wireless system at a foundational level with best practices and processes.The early 2000s version of war dialing is war driving, roaming around with a laptop, wireless NIC, and an antenna and attempting to gain access to wireless networks. As we have discussed, the vast majority of wireless networks deployed doanbsp;...
|Title||:||Wireless Security and Privacy|
|Author||:||Tara M. Swaminatha, Charles R. Elden|
|Publisher||:||Addison-Wesley Professional - 2003|