Page: 1 2 3 Next

Parts by Number Top

Part # Distributor Manufacturer Product Category Description
MRF24J40MC Microchip Technology, Inc. Microchip Technology, Inc. Not Provided of PIC ® microcontrollers via a 4-wire SPI interface and is an ideal solution for AMR/AMI metering, wireless sensor networks, home automation, building automation and consumer applications. 2.4 GHz IEEE 802.15.4 Transceiver ModuleSupports ZigBee ®, MiWi ™, and MiWi P2P protocolsFCC...
MRF24J40MB Microchip Technology, Inc. Microchip Technology, Inc. Not Provided microcontrollers via a 4-wire SPI interface and is an ideal solution for AMR/AMI metering, wireless sensor networks, home automation, building automation and consumer applications. 2.4 GHz IEEE 802.15.4 Transceiver ModuleSupports ZigBee ®, MiWi ™, and MiWi P2P protocolsFCC (USA), IC...
MRF24J40MAT Microchip Technology, Inc. Microchip Technology, Inc. Not Provided interface and is an ideal solution for wireless sensor networks, home automation, building automation and consumer applications. 2.4 GHz IEEE 802.15.4 Transceiver ModuleSupports ZigBee ™, MiWi ™, and MiWi P2P protocolsFCC (USA), IC (Canade), ETSI (Europe) CertifiedIntegrated PCB Antenna...
EVR100 ASAP Semiconductor Engenius Not Provided EnGenius Network EVR100 300Mbps Wireless N Security VPN Router w
01-SSC-8735-KIT ASAP Semiconductor HP Not Provided KIT TZ 100 WIRELESS-N NETWORK PERP SECURITY APPLIANCE

Conduct Research Top

  • Wireless Operational Security
    Wireless Operational Security. This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies.
  • Wireless Security with IEEE 802.11
    If you're new to wireless, the first thing you should realize is that the signals you send and receive from a nearby access point are easily intercepted by anyone in the vicinity who has a wireless card and a computer. The purpose of WLAN security techniques is to render the connection unusable
  • How to Cheat at Securing a Wireless Network
    How to Cheat at Securing a Wireless Network. Providing best-practice solutions to address threats and to maintain a secure and accessible wireless network, this book endorses the principle that the best strategy is to deploy multiple layers of security, each reinforcing the other.
  • Smart Computing Article - MAC-Based Security For Wireless Networks
    MAC-Based Security For Wireless Networks August 2006 Vol.10 Issue 5 Page(s) 120-121 in print issue Add To My Personal Library MAC-Based Security For Wireless Networks Secure Your Wireless Network With MAC Address Filtering Wireless networks are incredibly convenient: no wires to clutter up your
  • Wireless Security on the Plant Floor (.pdf)
    Wireless networks can consist of many radio types based on the radio frequency. and the modulation methods. Radios may be required to obtain a license to. operate in an area or be part of the FCC approved unlicensed ISM band. Radio. technologies in the ISM band are most commonly available
  • Wireless Workout
    a technology that doesn't need cables? Wireless networking is a fantastic way to connect home computers, and it's advantages are easily recognizable, but this technology is not for everyone. Wireless networks are slower than their copper counterparts, have serious security concerns, can interfere
  • Smart Computing Article - Advanced Wireless Security Options
    August 2006 Vol.10 Issue 5 Page(s) 122-125 in print issue Add To My Personal Library Protection For SOHO Wireless Networks Although today s wireless home networks are convenient and easy to install, they are far less secure than old-fashioned wired net- works. Out of the box, most wireless
  • WarDriving & Wireless Penetration Testing
    WarDriving & Wireless Penetration Testing. Focusing on the methods used by professionals to perform WarDriving and wireless penetration testing, this book is geared specifically for those individuals that perform security assessments and penetration tests on wireless networks.

More Information Top

Lock Indicates content that may require registration and/or purchase. Powered by IHS Goldfire