A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection - Encyclopedia of Information Science and Technology, Third Edition [Book]

The 802.11 wireless network revolution has not come without trouble. Since their creation, wireless networks have been plagued with security problems, derived from poor initial design of 802.11 security mechanisms, accelerated deployment and adoption of the technology, and lack of user education.

Autores:
Madrid Molina, Juan Manuel
Tipo de recurso:
Part of book
Fecha de publicación:
2014
Institución:
Universidad ICESI
Repositorio:
Repositorio ICESI
Idioma:
spa
OAI Identifier:
oai:repository.icesi.edu.co:10906/79552
Acceso en línea:
https://www.safaribooksonline.com/library/view/encyclopedia-of-information/9781466658882/978-1-4666-5888-2.ch413.xhtml
https://books.google.com.co/books?id=MJd_BAAAQBAJ&pg=PA4207&lpg=PA4207&dq=A+Survey+Of+Attack+Mechanisms+On+Infrastructure-Mode+802.11+Wi
http://hdl.handle.net/10906/79552
Palabra clave:
Red inalámbrica
Automatización y sistemas de control
Systems engineering
Rights
openAccess
License
https://creativecommons.org/licenses/by-nc-nd/4.0/
id ICESI2_32eb7ba8f194b2f153a18a8e1df2ca49
oai_identifier_str oai:repository.icesi.edu.co:10906/79552
network_acronym_str ICESI2
network_name_str Repositorio ICESI
repository_id_str
spelling Madrid Molina, Juan Manuel2016-06-29T02:01:15Z2016-06-29T02:01:15Z2014-01-019781466658882https://www.safaribooksonline.com/library/view/encyclopedia-of-information/9781466658882/978-1-4666-5888-2.ch413.xhtmlhttps://books.google.com.co/books?id=MJd_BAAAQBAJ&pg=PA4207&lpg=PA4207&dq=A+Survey+Of+Attack+Mechanisms+On+Infrastructure-Mode+802.11+Wihttp://hdl.handle.net/10906/79552instname: Universidad Icesireponame: Biblioteca Digitalrepourl: https://repository.icesi.edu.co/The 802.11 wireless network revolution has not come without trouble. Since their creation, wireless networks have been plagued with security problems, derived from poor initial design of 802.11 security mechanisms, accelerated deployment and adoption of the technology, and lack of user education.spaIGI GlobalEncyclopedia Of Information Science And TechnologyEL AUTOR, expresa que la obra objeto de la presente autorización es original y la elaboró sin quebrantar ni suplantar los derechos de autor de terceros, y de tal forma, la obra es de su exclusiva autoría y tiene la titularidad sobre éste. PARÁGRAFO: en caso de queja o acción por parte de un tercero referente a los derechos de autor sobre el artículo, folleto o libro en cuestión, EL AUTOR, asumirá la responsabilidad total, y saldrá en defensa de los derechos aquí autorizados; para todos los efectos, la Universidad Icesi actúa como un tercero de buena fe. Esta autorización, permite a la Universidad Icesi, de forma indefinida, para que en los términos establecidos en la Ley 23 de 1982, la Ley 44 de 1993, leyes y jurisprudencia vigente al respecto, haga publicación de este con fines educativos. Toda persona que consulte ya sea la biblioteca o en medio electrónico podrá copiar apartes del texto citando siempre la fuente, es decir el título del trabajo y el autor.https://creativecommons.org/licenses/by-nc-nd/4.0/info:eu-repo/semantics/openAccessAtribuci�n-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0)http://purl.org/coar/access_right/c_abf2Red inalámbricaAutomatización y sistemas de controlSystems engineeringA Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection - Encyclopedia of Information Science and Technology, Third Edition [Book]info:eu-repo/semantics/bookParthttp://purl.org/coar/resource_type/c_3248Parte de libroinfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/version/c_970fb48d4fbd8a85ORIGINALdocumento.htmldocumento.htmltext/html481http://repository.icesi.edu.co/biblioteca_digital/bitstream/10906/79552/1/documento.html7a2984c53c120308fce7a4fb4cec5da1MD5110906/79552oai:repository.icesi.edu.co:10906/795522020-05-12 06:50:57.967Biblioteca Digital - Universidad icesicdcriollo@icesi.edu.co
dc.title.spa.fl_str_mv A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection - Encyclopedia of Information Science and Technology, Third Edition [Book]
title A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection - Encyclopedia of Information Science and Technology, Third Edition [Book]
spellingShingle A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection - Encyclopedia of Information Science and Technology, Third Edition [Book]
Red inalámbrica
Automatización y sistemas de control
Systems engineering
title_short A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection - Encyclopedia of Information Science and Technology, Third Edition [Book]
title_full A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection - Encyclopedia of Information Science and Technology, Third Edition [Book]
title_fullStr A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection - Encyclopedia of Information Science and Technology, Third Edition [Book]
title_full_unstemmed A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection - Encyclopedia of Information Science and Technology, Third Edition [Book]
title_sort A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection - Encyclopedia of Information Science and Technology, Third Edition [Book]
dc.creator.fl_str_mv Madrid Molina, Juan Manuel
dc.contributor.author.spa.fl_str_mv Madrid Molina, Juan Manuel
dc.subject.none.fl_str_mv Red inalámbrica
Automatización y sistemas de control
Systems engineering
topic Red inalámbrica
Automatización y sistemas de control
Systems engineering
description The 802.11 wireless network revolution has not come without trouble. Since their creation, wireless networks have been plagued with security problems, derived from poor initial design of 802.11 security mechanisms, accelerated deployment and adoption of the technology, and lack of user education.
publishDate 2014
dc.date.issued.none.fl_str_mv 2014-01-01
dc.date.accessioned.none.fl_str_mv 2016-06-29T02:01:15Z
dc.date.available.none.fl_str_mv 2016-06-29T02:01:15Z
dc.type.none.fl_str_mv info:eu-repo/semantics/bookPart
dc.type.coar.none.fl_str_mv http://purl.org/coar/resource_type/c_3248
dc.type.local.none.fl_str_mv Parte de libro
dc.type.version.none.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.coarversion.none.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
format http://purl.org/coar/resource_type/c_3248
status_str publishedVersion
dc.identifier.isbn.none.fl_str_mv 9781466658882
dc.identifier.other.spa.fl_str_mv https://www.safaribooksonline.com/library/view/encyclopedia-of-information/9781466658882/978-1-4666-5888-2.ch413.xhtml
https://books.google.com.co/books?id=MJd_BAAAQBAJ&pg=PA4207&lpg=PA4207&dq=A+Survey+Of+Attack+Mechanisms+On+Infrastructure-Mode+802.11+Wi
dc.identifier.uri.none.fl_str_mv http://hdl.handle.net/10906/79552
dc.identifier.instname.none.fl_str_mv instname: Universidad Icesi
dc.identifier.reponame.none.fl_str_mv reponame: Biblioteca Digital
dc.identifier.repourl.none.fl_str_mv repourl: https://repository.icesi.edu.co/
identifier_str_mv 9781466658882
instname: Universidad Icesi
reponame: Biblioteca Digital
repourl: https://repository.icesi.edu.co/
url https://www.safaribooksonline.com/library/view/encyclopedia-of-information/9781466658882/978-1-4666-5888-2.ch413.xhtml
https://books.google.com.co/books?id=MJd_BAAAQBAJ&pg=PA4207&lpg=PA4207&dq=A+Survey+Of+Attack+Mechanisms+On+Infrastructure-Mode+802.11+Wi
http://hdl.handle.net/10906/79552
dc.language.iso.spa.fl_str_mv spa
language spa
dc.relation.ispartof.none.fl_str_mv Encyclopedia Of Information Science And Technology
dc.rights.uri.none.fl_str_mv https://creativecommons.org/licenses/by-nc-nd/4.0/
dc.rights.accessrights.none.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.license.none.fl_str_mv Atribuci�n-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0)
dc.rights.coar.none.fl_str_mv http://purl.org/coar/access_right/c_abf2
rights_invalid_str_mv https://creativecommons.org/licenses/by-nc-nd/4.0/
Atribuci�n-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0)
http://purl.org/coar/access_right/c_abf2
eu_rights_str_mv openAccess
dc.publisher.spa.fl_str_mv IGI Global
institution Universidad ICESI
bitstream.url.fl_str_mv http://repository.icesi.edu.co/biblioteca_digital/bitstream/10906/79552/1/documento.html
bitstream.checksum.fl_str_mv 7a2984c53c120308fce7a4fb4cec5da1
bitstream.checksumAlgorithm.fl_str_mv MD5
repository.name.fl_str_mv Biblioteca Digital - Universidad icesi
repository.mail.fl_str_mv cdcriollo@icesi.edu.co
_version_ 1814094867005964288