AIS300 - Scheme of Work - Scholarly Commons Home
AIS300 - Scheme of Work - Scholarly Commons Home
AIS300 - Scheme of Work - Scholarly Commons Home
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Farshchi, J. (2003). Wireless Intrusion Detection Systems. Retrieved June 30, 2007,<br />
from http://www.securityfocus.com/infocus/1742<br />
Fogarty, K. (2005). Eye on 802.11i. Retrieved June 10, 2007, from<br />
http://www.networkworld.com/techinsider/2005/031405tiwireless2.html<br />
Fritz, J. (2004). Network-modelling tools. Network World Retrieved May 10, 2006,<br />
from http://www.techworld.com/networking/features/index.cfm?featureid=938<br />
Gao, Z., & Ansari, N. (2005). Tracing cyber attacks from the practical perspective.<br />
IEEE Communication Magazine, 123-131.<br />
Gast, M. (2002). Wireless LAN Security: A Short History. Retrieved 10 April, 2006,<br />
from http://www.oreillynet.com/pub/a/wireless/2002/04/19/security.html<br />
Geier, J. (2002a). 802.11 WEP: Concepts and vulnerability. Retrieved June 10, 2007,<br />
from http://www.wi-fiplanet.com/tutorials/article.php/1368661<br />
Geier, J. (2002b). Making the Choice: 802.11a or 802.11g. Retrieved June 30, 2007,<br />
from http://www.wi-fiplanet.com/tutorials/article.php/1009431<br />
GloMoSim. (2001). GloMoSim Manual. Retrieved 20 April, 2007, from<br />
http://pcl.cs.ucla.edu/projects/glomosim/GloMoSimManual.html<br />
Goktruk, E. (2006). Towards simulator interoperability and model interreplaceability in<br />
network simulation and emulation through AMINES-HLA Paper presented at the<br />
37th conference on Winter simulation Monterey, California<br />
Haskin, D. (2007). FAQ: 802.11n wireless networking [Electronic Version].<br />
Computerworld from<br />
http://www.computerworld.com/action/article.do?command=viewArticleBasic&<br />
articleId=9019472.<br />
Henning, R. R. (2003). Vulnerability assessment in wireless networks. Paper presented<br />
at the Symposium on Applications and the Internet <strong>Work</strong>shops, 2003. .<br />
Hole, K. J., Dyrnes, E., & Thorsheim, P. (2005). Securing Wi-Fi Networks. Computer,<br />
July, 28-34.<br />
Housley, R., & Arbaugh, W. A. (2003). Security problems in 802.11-based networks.<br />
Communication ACM, 46(5), 31-34.<br />
Hurley, C., Thornton, F., & Puchol, M. (2004). Wardriving: drive, detect, defend a<br />
guide to wireless security. Rockland: Syngress Publishing, Inc.<br />
IEEE. (2006). IEEE OUI and Company_id Assignments. Retrieved July 22, 2007,<br />
from http://standards.ieee.org/regauth/oui/oui.txt<br />
Jacobs, D. (2007). 802.11n creates systems integration opportunities. Retrieved June<br />
30, 2007, from<br />
http://searchnetworkingchannel.techtarget.com/tip/0,289483,sid100_gci1255715<br />
,00.html<br />
48