[Full-disclosure] Practical Wireless Deployment Methodology (PWDM)



Hi Everyone,

We've launched a hardware-neutral wireless deployment/upgrading
methodology at http://www.pwdm.net and would like some feedback on
whether it is useful to you and how we can make it more so.

The PWDM (Practical Wireless Deployment Methodology) is a practical,
vendor-independent methodology which is intended to help people who
are tasked with deploying, upgrading, maintaining & securing 802.11-
based WLANs, irrespective of whether they are private (SOHO,
enterprise, home) or public (hotspots) in nature.

The methodology comprises the following steps:
* Deployment Analysis
* Contractual Negotiation
* Deployment Tactical Planning
* Deployment Procedural Rollout
* Supporting Infrastructure Rollout
* AP Security Issues
* Layer 3 Mitigation Strategies
* Management Overlay
* Gateway Security
* UAT & Commissioning

If you're interested in taking a look, you can download the current
version of the PWDM (ver 1.4) at http://www.pwdm.net

Thanks & Regards,
J.Ho
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Relevant Pages

  • Re: High level of alert in India
    ... precautionary measures including additional deployment at US ... Aviation Security too issued an advisory for stepping up vigilance at ... Security agencies apprehend that Indian Mujahideen, ... these American installations. ...
    (sci.military.naval)
  • Re: High level of alert in India
    ... precautionary measures including additional deployment at US installations ... Aviation Security too issued an advisory for stepping up vigilance at ...
    (sci.military.naval)
  • Re: Digital signing of assembly hosted in IE
    ... There is also the option of creating a security deployment msi package that ... Check out the Create Deployment Package option under Runtime Security ... > to make it easier for deployment of code requiring greater permissions ...
    (microsoft.public.dotnet.security)
  • Re: CAN STRONG NAMES BE CRACKED?
    ... Their good enough for many Fortune 500 companies to sign their ... the time of deployment. ... Given that strong names are such such a key component of security and ... ways strong names are good enough for Microsoft to bet the company on ...
    (microsoft.public.dotnet.languages.vb)
  • Re: Branch Office Setup
    ... Welcome to Designing and Deploying Directory and Security Services of the ... Remember to design with security in mind right from the beginning. ... Also with VPN, go ahead and look at ISA2004. ... Here is just a sample of ISA 2004 stuff which relates to AD deployment. ...
    (microsoft.public.windows.server.active_directory)