Wireless Security and Privacy: Best Practices and Design Techniques

Chapter 9.  Identify Targets and Roles

Chapter 10.  Analyze Attacks and Vulnerabilities

Chapter 11.  Analyze Mitigations and Protections

Chapter 12.  Define and Design

Категории