马上开始. 它是免费的哦
注册 使用您的电邮地址
Proposal 作者: Mind Map: Proposal

1. 2. Literature Review

1.1. 2.1 Introduction

1.1.1. WEP

1.1.2. ACLs

1.1.3. 802.11 Authentication

1.1.4. SSID

1.2. 2.2 VoIP

1.2.1. WEP Encryption

1.2.2. WEP Data Integrity

1.2.3. ACLs

1.2.4. Shared key Authenticaion

1.2.5. SSID

1.3. 2.3 IPv6

1.3.1. Place Edge Firewall

1.3.2. Employ VPN

1.3.3. Turn on WEP

1.3.4. Alternatives to VPN - SSH & IPSec

1.3.5. Key Management

1.3.6. Place Client Firewall

1.3.7. Reduce Power

1.3.8. Test your security

1.3.9. EAP

1.4. 2.4 IPSec

2. 4. Bibliography

3. 1. Introduction

3.1. 1.1 Research Problrems

3.2. 1.2 Aims and Objectives

3.3. 1.3 Research Background

3.4. 1.4 Significance of Study

3.5. 1.5 Limitations of Study

4. 3. Research Methodology

4.1. 3.1 Approach

4.2. 3.2 Implementation

4.2.1. Building Test Scenario

4.2.2. Participants

4.2.3. Data Garthering

4.2.4. Data Analysing

4.3. 3.3 Anticipated Outcomes

4.4. 3.4 Ensuring Reliable Resutls

4.5. 3.5 Ethical Issues

4.6. 3.6 Anticipated Problems

4.7. 3.7 Timeline

4.8. 3.8 Resource Requirements