March 2003
Wireless Week;3/8/2003, Vol. 9 Issue 6, p30
Trade Publication
Presents an update on wireless communication technologies as of March 2003. Features of WiFi Watchdog security solution from Newbury Networks; Availability of Commil's Cellarion Bluetooth System for in-building mobile voice and data communication; Description of the Memory Oriented Coprocessor Accelerator technology for the Java platform unveiled by NanoAmp Solutions Inc.


Related Articles

  • WEP can't stand alone for security. H.B. // eWeek;04/16/2001, Vol. 18 Issue 15, p49 

    Focuses on the Wireless Equivalent Privacy (WEP) security protocol for wireless local area network (WLAN) standards. Susceptibility of WLAN to security breaches; Limitations of WEP.

  • Bad Reception. Hogan, Mike // Entrepreneur;Feb2002, Vol. 30 Issue 2, p31 

    Examines the threats to the security of companies which use Wireless Local Area Network. Development of software applications by computer hackers to threaten the privacy of business entities which use online technology; Ways to secure wireless network; Information on the devices which will...

  • 802.11x Freedom battles insecurity on the tech front. Thompson, Jim // Mobile Radio Technology;Jan2003, Vol. 21 Issue 1, p24 

    Discusses wireless networking's use of 802.11 standard defined by the Institute of Electrical and Electronics Engineers (IEEE). Security of wireless local area networks; Attacks on public and private networks; Advantages of Wi-Fi Protected Access IEEE standard. INSET: The ABCs of 802.11.

  • The scoop on wireless LAN snoops. Merserve, Jason // Network World;9/17/2001, Vol. 18 Issue 38, p17 

    Reports on Guardent Inc.'s demonstration of the potential dangers of unprotected wireless local area network (LAN) traffic in Cambridge, Massachusetts. Types of information gathered by the firm from wireless LAN; Sources of security threats to wireless LAN.

  • WLANs vulnerable to security breaches, Gartner research predicts.  // Frontline Solutions;Sep2001, Vol. 2 Issue 10, p52 

    Reports on the vulnerability of wireless local area networks (WLAN) to security breaches in the United States. Estimates on the number of firms suffering from security breaches in their computer systems; Sources of WLAN security flaws.

  • Wireless LAN security. Janss, Steve // Network World;12/17/2001, Vol. 18 Issue 51, p45 

    Focuses on products that resolve problems in 802.11b security of wireless local area networks. AccessPoint 6000 from 3Com; Access Server from Avaya; Cisco's Aironet 350 and ACS; Colubris' CN 1000; Extra encryption that numerous 802.11b products claim to provide. INSET: Alternatives to 802.11b..

  • 3Com boosts wireless LAN security. Hochmuth, Phil // Network World;07/17/2000, Vol. 17 Issue 29, p23 

    Reports on 3Com's introduction of its Superstack II Router 400, a product that provides wireless local area network (LAN) users with data encryption and security. Use of Layer 3 encrypted tunnelling technology; Security of wireless LAN traffic in large wireless enterprise networks; Use of a...

  • Less wires, more connections. Gibbs, Mark // Network World;10/29/2001, Vol. 18 Issue 44, p38 

    Describes how companies will suffer serious security exposures from deploying wireless local area networks (WLAN) without implementing the proper security. Updating acceptable use policies to highlight and define the issues of wireless networking; Emergence of public access wireless networks,...

  • Protecting Wireless Local Area Networks. Radack, Shirley; Kuhn, Rick // IT Professional;Nov/Dec2012, Vol. 14 Issue 6, p59 

    To help organizations improve their WLAN security, the National Institute of Standards and Technology recently published Guidelines for Securing Wireless Local Area Networks (WLANs): Recommendations of the National Institute of Standards and Technology. Here, the authors summarize some of the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics