Last year, in "Time To Tighten the Wireless Net", we went with wireless intrusion-detection systems. This year ... subdivided into three threat levels: active, passive and on-location.
Currently, guidelines exist for intrusion systems, power supplies, warning devices and wireless elements ... Following each application, the detector should be switched into active mode after 180 s ...