Sorry, we do not have enough data to show an influence graph for this author.
- Full text PDF available (0)
This paper examines wireless mesh network use in small businesses as well as large organizations and how they are compromised. This paper uses an evaluation approach to understanding how organizations protect their wireless mesh networks and how incident response, disaster recovery and business continuity plans are affected as a result. As network… (More)