Safe and secure?

Saccomano, Ann
March 2003
Journal of Commerce (1542-3867);3/10/2003, Vol. 4 Issue 10, p33
Discusses the vulnerability of wireless networks and its effects on enterprises. Description of wireless fidelity; Sectors in which the technology is popular; Discussion on the security features of wireless networks.


Related Articles

  • THE WIRELESS DATA VALUE CHAIN. Reddy, Rajesh T.S // Siliconindia;Apr2001, Vol. 5 Issue 4, p46 

    Discusses the need for companies and entrepreneurs to understand the various elements of the wireless data value chain. Phases of the market's evolution in the context of each element; Extension of the wireless data value chain from carriers to the enterprise; Factors driving the mass adoption...

  • Wireless Workplace. Goldman, Chris // Wireless Review;12/15/2000, Vol. 17 Issue 24, p12 

    Focuses on the emergence of wireless-data solutions in corporate networks. Wireless data solution used by BestTransport.com; Predicted growth of enterprise applications; Goals of wireless data solution.

  • Getting around to wireless networking. Morris, Charlie // InfoWorld;02/28/2000, Vol. 22 Issue 9, p46 

    Evaluates the performance of wireless computer networks for business enterprises. Benefits of wireless technology; Architecture of a wireless network; Wireless Internet access.

  • Motion Sickness. Gohring, Nancy // Interactive Week;10/29/2001, Vol. 8 Issue 42, p26 

    Focuses on the threat of computer crimes on the proliferation of wireless corporate networks. Vulnerability of wireless networks; Wireless virus attacks outside the United States; Security measures and products for wireless networks. INSET: SECURING LAN AND AIR.

  • Wireless by the numbers.  // Frontline Solutions;Sep2001, Vol. 2 Issue 10, p52 

    Presents statistical data on wireless communication systems, compiled as of September 2001. Number of enterprises planning to implement wireless local area (LAN) networks; Rogue wireless LAN attached to corporate networks; Firms expected to experience security breaches via unsecured wireless...

  • Wireless gateways pave road to enterprise. Fontana, John // Network World;1/28/2002, Vol. 19 Issue 4, p22 

    Discusses the need for information technology (IT) executives to evolve their network infrastructures with wireless access middleware or gateways. Projected growth of the mobile electronic business market by 2004; Role of gateways in brokering connections with wireless devices; Provision of...

  • Swede Inspiration. Ankeny, Jason // Wireless Review;Jul2002, Vol. 19 Issue 7, p9 

    Focuses on the wireless security and reliability offered by Columbitech to its enterprise wireless local area network technology. Features of Columbitech's wireless suite; Function of the company's always-on solution; Advantages offered by the solutions to the enterprise market.

  • Nextel Online: Late To The Party But Bearing A Great Gift. Vaughan, Allyson // Wireless Week;05/01/2000, Vol. 6 Issue 18, p4 

    Focuses on the efforts of Nextel Communications Inc. to launch wireless Internet services for businesses. Competitors of Nextel; Advantages of Nextel over its competitors.

  • Enabling the Adaptive Enterprise. Salz, Peggy Ann // EContent;Sep2004, Vol. 27 Issue 9, p36 

    The ability of wireless networks to reach virtually any point on the planet makes mobile communications one of the most important and challenging frontiers for the enterprise. To be successful, organizations must absorb mobility into their way of doing business and shift from a culture in which...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics