Wirelss Security on Security Standard Policy: A Case Studty

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4

Abstract

Administrators of a network have a variety of different uthentication and encryption technologies to choose from. Administrators must also take into account a variety of organizational factors, not just of technical factors and must ank what their risks are and then design a security policy that is cost effective and manageable. This paper shows variety of systems security on different network systems and then and rovide a solution to adjust security systems of wireless etwork on ecurity standard and also analyze case studies of how to eployed security systems.

Authors and Affiliations

Reza Amirpoor , Ajay Kumar , Satish R. Deavne

Keywords

Related Articles

Algorithm for Efficient Multilevel Association Rule Mining

over the years, a variety of algorithms for finding frequent item sets in very large transaction databases have been developed. The problems of finding frequent item sets are basic in multi level association rule mining,...

A Face Recognition System Through Somatology

Normally facial recognition algorithms identify faces by extracting landmarks or features from an image of the subject’s face and then algorithm may analyze the relative size, shape of the eyes, nose, cheekbones, and jaw...

Printed and Handwritten Mixed Kannada Numerals Recognition Using SVM

A mixer of printed and handwritten numerals may appear in a single document such as application forms, postal mail, and official documents. The process of identifying of such mixed numerals and sending it to respective O...

A study on the effectiveness of virtual lab in Elearning

The research aims to identify the effectiveness of virtual lab in E-learning suite. The study aims to analyze the increase in learning skills and the understanding level of concepts by implementing virtual lab among scho...

Fuzzy Metagraph and Hierarchical Modeling

In this paper , we show the transformation of a fuzzy metagraph from one form to another based on the projection operator that identifies only the necessary sets of elements for computing. This paper also show some impor...

Download PDF file
  • EP ID EP97264
  • DOI -
  • Views 80
  • Downloads 0

How To Cite

Reza Amirpoor, Ajay Kumar, Satish R. Deavne (2010). Wirelss Security on Security Standard Policy: A Case Studty. International Journal on Computer Science and Engineering, 2(4), 1067-1071. https://europub.co.uk/articles/-A-97264