Publisher's Synopsis
This cutting-edge resource offers a broad overview of wireless security, as well as a solid understanding of critical cryptography techniques and the methods used to implement an effective cryptography architecture for any organization.