Recommendation for EAP methods used in wireless network access authentication
Saved in:
Main Author: | Hoeper, Katrin. |
---|---|
Other Authors: | Chen, Lily., National Institute of Standards and Technology (U.S.) |
Format: | Electronic |
Language: | English |
Published: |
[Gaithersburg, Md.] :
U.S. Dept. of Commerce, National Institute of Standards and Technology,
[2009]
|
Physical Description: |
1 online resource (53 pages) : illustrations. |
Series: |
NIST special publication ;
800-120. NIST special publication. Computer security. |
Subjects: | |
Online Access: |
http://purl.access.gpo.gov/GPO/LPS116388 |
In Prospector
Similar Items
-
Recommendation for EAP methods used in wireless network access authentication
by: Hoeper, Katrin.
Published: (2008) -
Guide to securing legacy IEEE 802.11 wireless networks recommendations of the National Institute of Standards and Technology
by: Kent, Karen
Published: (2008) -
Wireless network security 802.11, Bluetooth and handheld devices : recommendations of the National Institute of Standards and Technology
by: Karygiannis, Tom.
Published: (2002) -
Guide to enterprise telework and remote access security (draft) recommendations of the National Institute of Standards and Technology
by: Kent, Karen
Published: (2009) -
Guide to IEEE 802.11i establishing robust security networks : recommendations of the National Institute of Standards and Technology
by: Frankel, Sheila.
Published: (2006)