A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection - Encyclopedia of Information Science and Technology, Third Edition [Book]
The 802.11 wireless network revolution has not come without trouble. Since their creation, wireless networks have been plagued with security problems, derived from poor initial design of 802.11 security mechanisms, accelerated deployment and adoption of the technology, and lack of user education.
- Autores:
-
Madrid Molina, Juan Manuel
- Tipo de recurso:
- Part of book
- Fecha de publicación:
- 2014
- Institución:
- Universidad ICESI
- Repositorio:
- Repositorio ICESI
- Idioma:
- spa
- OAI Identifier:
- oai:repository.icesi.edu.co:10906/79552
- Acceso en línea:
- https://www.safaribooksonline.com/library/view/encyclopedia-of-information/9781466658882/978-1-4666-5888-2.ch413.xhtml
https://books.google.com.co/books?id=MJd_BAAAQBAJ&pg=PA4207&lpg=PA4207&dq=A+Survey+Of+Attack+Mechanisms+On+Infrastructure-Mode+802.11+Wi
http://hdl.handle.net/10906/79552
- Palabra clave:
- Red inalámbrica
Automatización y sistemas de control
Systems engineering
- Rights
- openAccess
- License
- https://creativecommons.org/licenses/by-nc-nd/4.0/
id |
ICESI2_32eb7ba8f194b2f153a18a8e1df2ca49 |
---|---|
oai_identifier_str |
oai:repository.icesi.edu.co:10906/79552 |
network_acronym_str |
ICESI2 |
network_name_str |
Repositorio ICESI |
repository_id_str |
|
spelling |
Madrid Molina, Juan Manuel2016-06-29T02:01:15Z2016-06-29T02:01:15Z2014-01-019781466658882https://www.safaribooksonline.com/library/view/encyclopedia-of-information/9781466658882/978-1-4666-5888-2.ch413.xhtmlhttps://books.google.com.co/books?id=MJd_BAAAQBAJ&pg=PA4207&lpg=PA4207&dq=A+Survey+Of+Attack+Mechanisms+On+Infrastructure-Mode+802.11+Wihttp://hdl.handle.net/10906/79552instname: Universidad Icesireponame: Biblioteca Digitalrepourl: https://repository.icesi.edu.co/The 802.11 wireless network revolution has not come without trouble. Since their creation, wireless networks have been plagued with security problems, derived from poor initial design of 802.11 security mechanisms, accelerated deployment and adoption of the technology, and lack of user education.spaIGI GlobalEncyclopedia Of Information Science And TechnologyEL AUTOR, expresa que la obra objeto de la presente autorización es original y la elaboró sin quebrantar ni suplantar los derechos de autor de terceros, y de tal forma, la obra es de su exclusiva autoría y tiene la titularidad sobre éste. PARÁGRAFO: en caso de queja o acción por parte de un tercero referente a los derechos de autor sobre el artículo, folleto o libro en cuestión, EL AUTOR, asumirá la responsabilidad total, y saldrá en defensa de los derechos aquí autorizados; para todos los efectos, la Universidad Icesi actúa como un tercero de buena fe. Esta autorización, permite a la Universidad Icesi, de forma indefinida, para que en los términos establecidos en la Ley 23 de 1982, la Ley 44 de 1993, leyes y jurisprudencia vigente al respecto, haga publicación de este con fines educativos. Toda persona que consulte ya sea la biblioteca o en medio electrónico podrá copiar apartes del texto citando siempre la fuente, es decir el título del trabajo y el autor.https://creativecommons.org/licenses/by-nc-nd/4.0/info:eu-repo/semantics/openAccessAtribuci�n-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0)http://purl.org/coar/access_right/c_abf2Red inalámbricaAutomatización y sistemas de controlSystems engineeringA Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection - Encyclopedia of Information Science and Technology, Third Edition [Book]info:eu-repo/semantics/bookParthttp://purl.org/coar/resource_type/c_3248Parte de libroinfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/version/c_970fb48d4fbd8a85ORIGINALdocumento.htmldocumento.htmltext/html481http://repository.icesi.edu.co/biblioteca_digital/bitstream/10906/79552/1/documento.html7a2984c53c120308fce7a4fb4cec5da1MD5110906/79552oai:repository.icesi.edu.co:10906/795522020-05-12 06:50:57.967Biblioteca Digital - Universidad icesicdcriollo@icesi.edu.co |
dc.title.spa.fl_str_mv |
A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection - Encyclopedia of Information Science and Technology, Third Edition [Book] |
title |
A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection - Encyclopedia of Information Science and Technology, Third Edition [Book] |
spellingShingle |
A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection - Encyclopedia of Information Science and Technology, Third Edition [Book] Red inalámbrica Automatización y sistemas de control Systems engineering |
title_short |
A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection - Encyclopedia of Information Science and Technology, Third Edition [Book] |
title_full |
A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection - Encyclopedia of Information Science and Technology, Third Edition [Book] |
title_fullStr |
A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection - Encyclopedia of Information Science and Technology, Third Edition [Book] |
title_full_unstemmed |
A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection - Encyclopedia of Information Science and Technology, Third Edition [Book] |
title_sort |
A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection - Encyclopedia of Information Science and Technology, Third Edition [Book] |
dc.creator.fl_str_mv |
Madrid Molina, Juan Manuel |
dc.contributor.author.spa.fl_str_mv |
Madrid Molina, Juan Manuel |
dc.subject.none.fl_str_mv |
Red inalámbrica Automatización y sistemas de control Systems engineering |
topic |
Red inalámbrica Automatización y sistemas de control Systems engineering |
description |
The 802.11 wireless network revolution has not come without trouble. Since their creation, wireless networks have been plagued with security problems, derived from poor initial design of 802.11 security mechanisms, accelerated deployment and adoption of the technology, and lack of user education. |
publishDate |
2014 |
dc.date.issued.none.fl_str_mv |
2014-01-01 |
dc.date.accessioned.none.fl_str_mv |
2016-06-29T02:01:15Z |
dc.date.available.none.fl_str_mv |
2016-06-29T02:01:15Z |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/bookPart |
dc.type.coar.none.fl_str_mv |
http://purl.org/coar/resource_type/c_3248 |
dc.type.local.none.fl_str_mv |
Parte de libro |
dc.type.version.none.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.coarversion.none.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
format |
http://purl.org/coar/resource_type/c_3248 |
status_str |
publishedVersion |
dc.identifier.isbn.none.fl_str_mv |
9781466658882 |
dc.identifier.other.spa.fl_str_mv |
https://www.safaribooksonline.com/library/view/encyclopedia-of-information/9781466658882/978-1-4666-5888-2.ch413.xhtml https://books.google.com.co/books?id=MJd_BAAAQBAJ&pg=PA4207&lpg=PA4207&dq=A+Survey+Of+Attack+Mechanisms+On+Infrastructure-Mode+802.11+Wi |
dc.identifier.uri.none.fl_str_mv |
http://hdl.handle.net/10906/79552 |
dc.identifier.instname.none.fl_str_mv |
instname: Universidad Icesi |
dc.identifier.reponame.none.fl_str_mv |
reponame: Biblioteca Digital |
dc.identifier.repourl.none.fl_str_mv |
repourl: https://repository.icesi.edu.co/ |
identifier_str_mv |
9781466658882 instname: Universidad Icesi reponame: Biblioteca Digital repourl: https://repository.icesi.edu.co/ |
url |
https://www.safaribooksonline.com/library/view/encyclopedia-of-information/9781466658882/978-1-4666-5888-2.ch413.xhtml https://books.google.com.co/books?id=MJd_BAAAQBAJ&pg=PA4207&lpg=PA4207&dq=A+Survey+Of+Attack+Mechanisms+On+Infrastructure-Mode+802.11+Wi http://hdl.handle.net/10906/79552 |
dc.language.iso.spa.fl_str_mv |
spa |
language |
spa |
dc.relation.ispartof.none.fl_str_mv |
Encyclopedia Of Information Science And Technology |
dc.rights.uri.none.fl_str_mv |
https://creativecommons.org/licenses/by-nc-nd/4.0/ |
dc.rights.accessrights.none.fl_str_mv |
info:eu-repo/semantics/openAccess |
dc.rights.license.none.fl_str_mv |
Atribuci�n-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0) |
dc.rights.coar.none.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
rights_invalid_str_mv |
https://creativecommons.org/licenses/by-nc-nd/4.0/ Atribuci�n-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0) http://purl.org/coar/access_right/c_abf2 |
eu_rights_str_mv |
openAccess |
dc.publisher.spa.fl_str_mv |
IGI Global |
institution |
Universidad ICESI |
bitstream.url.fl_str_mv |
http://repository.icesi.edu.co/biblioteca_digital/bitstream/10906/79552/1/documento.html |
bitstream.checksum.fl_str_mv |
7a2984c53c120308fce7a4fb4cec5da1 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 |
repository.name.fl_str_mv |
Biblioteca Digital - Universidad icesi |
repository.mail.fl_str_mv |
cdcriollo@icesi.edu.co |
_version_ |
1814094867005964288 |