Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] identifying risks 2nd IDS (intrusion detection systems) IEEE (Institute for Electrical and Electronics Engineers) coexistence IEEE 802.11b standard IEEE 802.11g standard 2nd implementing AP management policies communication plan guest networks voice on WLANs WLAN video implementing enterprise WLANs case study in-house deployment versus outsourced deployment in-house management infrastructure checklist infrastructure layer asset classes security authentication encryption hashing network admission control infrastructure management infrastructure mode infrastructure requirements for WLAN deployment connectivity console access power installing APs interception of transmitted data interference medical field standards intermittent connectivity of mobile endpoints internally developed tools inventory taking, enhancing effectiveness through WLAN location services investment in IT infrastructure investments IRR, calculating NPV, calculating 2nd payback period, calculating ROI calculating IRR (internal rate of return) calculating isotropic antennae IT infrastructure, investment in |