Reliability, Availability and Security of Wireless Networks in the Community (Report) Reliability, Availability and Security of Wireless Networks in the Community (Report)

Reliability, Availability and Security of Wireless Networks in the Community (Report‪)‬

Informatica 2007, June, 31, 2

    • $5.99
    • $5.99

Publisher Description

Wireless networking increases the flexibility in the home, work place and community to connect to the Internet without being tied to a single location. Wireless networking has rapidly increased in popularity over recent years. There has also been a change in the use of the internet by users. Home users have embraced wireless technology and businesses see it as having a great impact on their operational efficiency. Both home users and industry are sending increasingly sensitive information through these wireless networks as online delivery of banking, commercial and governmental services becomes' more widespread However undeniable the benefits of wireless networking are, there are additional risks that do not exist in wired networks. It is imperative that adequate assessment and management of risk is undertaken by businesses' and home users. This paper reviews wireless network protocols, investigates issues of reliability, availability and security when using wireless networks. The paper, by use of a case study, illustrates the issues and importance of implementing secured wireless networks, and shows the significance of the issue. The paper presents a discussion of the case study and a set of recommendations to mitigate the threat. Povzetek: Zanesljivost, varnost in dosegljivost brezzicnih omrezij.

GENRE
Business & Personal Finance
RELEASED
2007
June 1
LANGUAGE
EN
English
LENGTH
28
Pages
PUBLISHER
Slovenian Society Informatika
SELLER
The Gale Group, Inc., a Delaware corporation and an affiliate of Cengage Learning, Inc.
SIZE
273.3
KB
Canadian Imperial Bank of Commerce Wireless Strategy Canadian Imperial Bank of Commerce Wireless Strategy
2001
Marketing Wireless Products Marketing Wireless Products
2012
The Network Manager's Handbook, Third Edition The Network Manager's Handbook, Third Edition
2021
The International Handbook of Computer Security The International Handbook of Computer Security
2013
TELUS Mobility - What to do With Mike TELUS Mobility - What to do With Mike
2002
Risk Assessment for Asset Owners Risk Assessment for Asset Owners
2007
On the Crossing Number of Almost Planar Graphs. On the Crossing Number of Almost Planar Graphs.
2006
Named Entity Recognition Using Appropriate Unlabeled Data, Post-Processing and Voting (Technical Report) Named Entity Recognition Using Appropriate Unlabeled Data, Post-Processing and Voting (Technical Report)
2010
Efficient Morphological Parsing with a Weighted Finite State Transducer (Report) Efficient Morphological Parsing with a Weighted Finite State Transducer (Report)
2009
The Modelling of Manpower by Markov Chains--a Case Study of the Slovenian Armed Forces (Report) The Modelling of Manpower by Markov Chains--a Case Study of the Slovenian Armed Forces (Report)
2008
Survey of Egovernment Services in Serbia (Report) Survey of Egovernment Services in Serbia (Report)
2007
Morphosyntactic Tagging of Slovene Legal Language. Morphosyntactic Tagging of Slovene Legal Language.
2006