Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] MAC sublayer machine-based authentication malicious hackers, profile of man-in-the-middle attacks management strategies for clients for infrastructure in-house management outsourced management user expectations of WLAN video management tools third-party WLAN management tools vendor-specific WLAN management tools manual site surveys manufacturing industry case study business model 2nd coverage guest access rogue AP detection security concerns throughput VoIP WLAN deployment deploying WLAN location services Value Chain framework, identifying key application areas Maslow, Abraham measuring benefits of WLAN deployment on university setting medical industry, interference standards Meetinghouse Data Communications mesh topology Microsoft Excel, calculating NPV minimizing AP signal strength mitigating security threats with authentication 2nd 802.11i standard 802.1x WPA with encryption with hashing, TKIP mobile devices, securing mobile endpoints intermittent connectivity mobile user class mobility as benefit of WLANs value of 2nd modulation monetized productivity benefit per WLAN, calculating multipath multiple access WLAN technologies multiplex technologies, DSSS OFDM |