http://www.w3.org/ns/prov#value | - h as war driving, jamming, hijacking, and man-in-the-middle attacksImplement security and controls such as MAC (Media Access Control) and protocol filtering, WEP (Wireless Equivalent Privacy), WPA, (Wi-Fi Protected Access), EAP (Extensible Authentication Protocol), and VPN (Virtual Private Network)Set up multiple access points to form a larger wireless networkComplete with suggestions of places to
|