Considering that there are many security concerns surrounding wireless networks, and many tools are freely available, how does and administrator or even an individual user go about ensuring the security of their wireless network? List a minimum of two methods/techniques, and explain the rationale for your decision?
week 7 Distressed Projects
Discuss your experiences with distressed projects. What lessons did you learn from these experiences?