Researching my book I came across this fairly informative article on
wireless IDS. It's useful as it spells out three ways to accomplish the task. The article publisher, Unstrung, has written about
Joshua Wright's attacks on LEAP, the vendor's
response, and
wireless IDS services.
Tidak ada komentar:
Posting Komentar