LEADER 00738nam0-2200253 --450 001 9910744985903321 005 20231019112331.0 100 $a20231019d1957----kmuy0itay5050 ba 101 $aita 102 $aIT 105 $a 001yy 200 1 $aMaometto il conquistatore e il suo tempo$fFranz Babinger 210 $aTorino$cEinaudi$d1957 215 $a795 p.$cill.$d22 cm 225 1 $aBiblioteca di cultura storica$v54 676 $a956$v19 700 1$aBabinger,$bFranz$0178040 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9910744985903321 952 $aDFT G11 BABF 01$fFLFBC 959 $aFLFBC 996 $aMehmed der Eroberer und Seine Zeit. Weltenstnr mer einer Zeitenwende$944836 997 $aUNINA LEADER 05164nam 22006374a 450 001 9910783515403321 005 20230617010446.0 010 $a0-7645-7977-0 035 $a(CKB)1000000000244184 035 $a(EBL)215155 035 $a(OCoLC)70720200 035 $a(SSID)ssj0000272646 035 $a(PQKBManifestationID)11204985 035 $a(PQKBTitleCode)TC0000272646 035 $a(PQKBWorkID)10309178 035 $a(PQKB)10432159 035 $a(MiAaPQ)EBC215155 035 $a(JP-MeL)3000030374 035 $a(Au-PeEL)EBL215155 035 $a(CaPaEBR)ebr10114251 035 $a(CaONFJC)MIL26607 035 $a(iGPub)WILEYB0019991 035 $a(EXLCZ)991000000000244184 100 $a20040525d2004 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aWireless networks for dummies$b[electronic resource] /$fby Barry Lewis and Peter T. Davis 205 $a1st ed. 210 $aHoboken, NJ $cWiley Pub.$dc2004 215 $a1 online resource (410 p.) 225 1 $a--For dummies 300 $aIncludes index. 311 $a0-7645-7525-2 327 $aWireless Networks For Dummies; About the Author; Dedication; Author's Acknowledgments; Contents at a Glance; Table of Contents; Introduction; About This Book; How to Use This Book; How This Book Is Organized; Icons Used in This Book; Where to Go from Here; Part I: Planning and Acquiring Your Network; Chapter 1: Removing the Tethers: Entering the Wireless World; Understanding the Risks and Rewards of Going Wireless; Applications of Wireless Networks; Sorting Out the Nets: Do I Need a WPAN, WLAN, or WMAN?; Using Wireless Networks; Turning a Notion into a Network 327 $aConvergence of Wireless Technologies - What Will the Future Hold?Chapter 2: If You Fail to Plan, You Plan to Fail; Evaluating Your Wireless Needs; Preparing for a Site Survey; Using Site Survey Equipment to Get It Right; Doing That Site Survey; Describing Your Final Plan in a Site Survey Report; Chapter 3: Matching Wireless Technologies to Your Plan; Choosing the Right Networking Hardware; Are You Being Served? IBSS, BSS, and ESS; Selecting the Wireless Mode; Gearing Up to Send and Receive Signals; Understanding and Using Layer 2 and 3 Concepts; Part II: Implementing Your Wireless Network 327 $aChapter 4: Getting a Quick Start with Wireless Personal Area NetworksUnderstanding IrDA; Understanding Bluetooth; IrDA and Bluetooth Comparison; Chapter 5: Moving On to a Wireless LAN: Your Wireless Access Point; Parts Is Parts - Do You Have Them All?; Connecting and Configuring Your Access Point; Initial Setup and Testing; Turning Off the Defaults; Testing the Signal; Chapter 6: Connecting Your Clients; Adding Hardware to the PC; Installing the Wireless Hardware; Configuring the Client's Operating System; Making Sure the Connection Works; Chapter 7: Building the Multi-Zone Network 327 $aRoaming Around with a Wireless MachineLoad Balancing - Are All Zones Used Equally?; Chapter 8: Using Wireless on the Road to Connect to the Office; Spontaneous Communities: Ad Hoc Networks; Wi-Fi Warriors on the Road; E-Mailing Wirelessly with Microsoft Exchange; Wireless Hot Spots: What's New Around the World?; Part III: Using Your Network Securely; Chapter 9: Considering a Deadbolt: Understanding the Risks of Wireless Networks; Risks to the Network; Risks to Your Users; Risks to Your Data; Chapter 10: Designing a Secure Network; Security as a Cost of Doing Business 327 $aDeveloping a Security ArchitectureDeveloping a Wireless Security Policy; Developing Wireless Security Standards; Developing Wireless Security Best Practices; Managing Your Wireless Security Policy; Designing a Secure Network; Performing a Risk Analysis; Chapter 11: Maintaining Network Security; Understanding Security Mechanisms; Three States of Authentication; Protecting Privacy; Protecting Message Integrity; Filtering the Chaff; Using Encryption; Protecting WEP Keys; Using Port Authentication; Chapter 12: Secure Wireless Access with Virtual Private Networking; Secure Access with a VPN 327 $aDeploying VPNs in WLANs 330 $aYou've probably heard the expression, "It's time to cut the cord." Well, it may be time to "cut the cables" at your office and free yourself from your desk and computer. Wireless networks are the waves of the future-literally. Wireless Networks For Dummies guides you from design through implementation to ongoing protection of your system and your information so you can:Remain connected to the office in airports and hotelsAccess the Internet and other network resources in the lunchroom, conference room, or anywhere there's an access pointUse your PDA or lapt 410 0$a--For dummies. 606 $aWireless LANs$vAmateurs' manuals 615 0$aWireless LANs 676 $a004.6/8 700 $aLewis$b Barry$0303744 701 $aDavis$b Peter T$0288243 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910783515403321 996 $aWireless networks for dummies$93778244 997 $aUNINA