Standards  >   Network Protocols  >   WLAN Protocols  >  

IEEE 802.11

RSS Feed    Add to Google    Add to My Yahoo!
IEEE 802.11Reports
 
802.1x - Implementing and Deploying Methods
sponsored by Global Knowledge
WHITE PAPER: You may have heard concerns or nightmare stories about 802.1X, but with the tools we have today and the method of implementation, this can be seamless in an environment and far exceeds any compliance requirements you may have.
Posted: 26 Jul 2013 | Published: 09 Jul 2013

Global Knowledge

Network Purchasing Intentions 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This exclusive Computer Weekly/TechTarget research ,based on a survey of over 400 European IT professionals, reveals organisationsā€™ investment plans for networking technology.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

ComputerWeekly.com

Underexposed risks of public Wi-Fi hotspots
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-FiĀ  hotspots.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

ComputerWeekly.com

Tired of Rogues - Solutions for Detecting & Eliminating Rogue Wireless Networks
sponsored by AirDefense Inc.
WHITE PAPER: This paper provides an overview of the different types of rogue wireless devices, the risks faced by enterprises due to their proliferation and multiple approaches to detecting and mitigating them.
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Demystifying Wireless Network Access and 802.1X Security
sponsored by Fluke Networks
WHITE PAPER: Network managers want to limit access to only authorized users and users need assurance they are accessing the right network. This paper provides insight into the typical wireless LAN client login process and 802.1X and EAP authentication processes.
Posted: 21 Aug 2006 | Published: 01 May 2006

Fluke Networks

Tackling the Top Five Network Access Control Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: Uncover the top five network access challenges that organizations today face and discover how a unified access control solution can provide the visibility, protection, and control you need to tackle these issues.
Posted: 21 Aug 2012 | Published: 31 Jan 2012

Juniper Networks, Inc.

Case Study: How Liverpool FC and Alexandra Palace successfully rolled out Wi-Fi
sponsored by Xirrus
EGUIDE: Access this exclusive guide to find out how the Liverpool Football club provides reliable, high-performing wireless access to the thousands of fans that visit their home stadium.
Posted: 25 Oct 2013 | Published: 25 Oct 2013

Xirrus

Building High Performance Networks with 802.11ac
sponsored by Xirrus
WHITE PAPER: This resource takes an inside look at the 802.11ac wireless networking standard, and offers tips and tactics to help you approach wired-equivalent performance per user.
Posted: 29 Jul 2013 | Published: 31 Dec 2012

Xirrus

Five Steps to Successfully Migrate to 802.11ac
sponsored by Aruba Networks
WHITE PAPER: 802.11ac is quickly becoming the definitive standard for next-generation Wi-Fi. This brief resource counts down five essential steps that will help you successfully migrate to 802.11ac.
Posted: 10 Jul 2013 | Published: 10 Jul 2013

Aruba Networks

Best Practices for Securing Your Wireless LAN
sponsored by AirMagnet
WHITE PAPER: This paper details real-world best practices needed to deploy and maintain a secure wireless network. Download this paper and learn how to effectively secure your wireless LAN by monitoring for a broad set of wireless attacks and intrusion techniques.
Posted: 14 Jun 2007 | Published: 14 Jun 2007

AirMagnet
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement