In this assessment, you will identify a security threat to a wireless network. You will then identify which points of the network might be vulnerable and recommend policies, defenses, and practices to ensure network security.
Need to report 1 You will submit two reports generated from your developed database. These reports should be meaningful to your database. The report(s)
Need to report 1 You will submit two reports generated from your developed database. These reports should be meaningful to your database. The report(s) resolve one of the problems that you originally identified in your Database Proposal.  The lay out should be appealing to the eye and the design should