Employ an intrusion detection system to monitor wireless communications traffic as the traffic passes from wireless to wireline networks.
Employ an intrusion detection system to monitor wireless communications traffic as the traffic passes from wireless to wireline networks.