May 2006
Intermediate to advanced
456 pages
9h 26m
English

The purpose of this chapter is to provide you with enough information to tackle the challenge of securing your WLAN infrastructure. This book repeatedly mentions the need for a security posture because security in your network is only as strong as the weakest link. This chapter provides an overview of key security components in WLANs, fundamental security vulnerabilities, key WLAN security standards, and security management challenges.
The fundamental premise of security in networked environments is that no network is truly secure. Even a network that is not connected to the ...