Standard Article

Wireless Security

Part 2. Cross-Cutting Themes and Technologies

4. Cyber Security

  1. Matthew Sexton,
  2. Edward Smith,
  3. Bernie Eydt

Published Online: 15 MAR 2009

DOI: 10.1002/9780470087923.hhs453

Wiley Handbook of Science and Technology for Homeland Security

Wiley Handbook of Science and Technology for Homeland Security

How to Cite

Sexton, M., Smith, E. and Eydt, B. 2009. Wireless Security. Wiley Handbook of Science and Technology for Homeland Security. 2:4:1–15.

Author Information

  1. Booz Allen Hamilton, McLean, Virginia

Publication History

  1. Published Online: 15 MAR 2009

Options for accessing this content:

  • If you have access to this content through a society membership, please first log in to your society website.
  • Login via other institutional login options http://onlinelibrary.wiley.com/login-options.
  • You can purchase online access to this Article for a 24-hour period (price varies by title)
    • If you already have a Wiley Online Library or Wiley InterScience user account: login above and proceed to purchase the article.
    • New Users: Please register, then proceed to purchase the article.

Type your institution's name in the box below. If your institution is a Wiley customer, it will appear in the list of suggested institutions and you will be able to log in to access content. Some users may also log in directly via OpenAthens.

Please note that there are currently a number of duplicate entries in the list of institutions. We are actively working on fixing this issue and apologize for any inconvenience caused.

Please register to:

  • Save publications, articles and searches
  • Get email alerts
  • Get all the benefits mentioned below!

Register now >