All
All

Protecting Wireless Local Area Networks

1.7MB | 3 files |  PDF

Use these recommendations from the new NIST guidelines to help your organization improve its WLAN security.

Many government and private-sector organizations have implemented wireless local area networks (WLANs) that let staff members with wireless-enabled devices, such as smartphones, connect to the Internet and the organization’s networks. Wireless networks thus support a mobile work force and can contribute to increased organizational productivity.

WLAN security depends on how well all of the WLAN components — including the client devices, access points and wireless switches — are secured throughout the WLAN life cycle.

Use these recommendations from the new NIST guidelines to help your organization improve its WLAN security.

Included in this ZIP file are:

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • Protecting Wireless Local Area Networks.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.
Related IT Downloads

network02 Evolutionary Dynamics of Complex Communications Networks

Chapter 1.2 focuses on the fundamentals of complex networks and complex network taxonomy and examples. ...  More >>

'Next Generation Wireless LANs: 802.11n and 802.11ac' Excerpt

This 10-page excerpt provides an overview and history of IEEE 802.11 technology. ...  More >>

Guide to Securing Legacy IEEE 802.11 Wireless Networks Guide to Securing Legacy IEEE 802.11 Wireless Networks

Older Wi-Fi equipment presents a world of security issues....  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data