8

Security Policy

In the preceding chapters a typical directive has been introduced (for mobile phones). The comprehensive directive proposed in this chapter contains some general elements, which can serve as the basis for any particular directive in an organisation. For specific applications templates are presented, which have to be completed in the appropriate places. To do this, contents from the preceding chapters in this book could be used.

8.1 Introduction

Wireless Security is part of a comprehensive concept regarding IT security. The latter can be divided into numerous documents all being mutually referred to each other and their complexity depending on the installation in question. It can be distinguished between strategic, technical, ...

Get Wireless Network Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.