09.11.2012 Views

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Jardosh, A., Belding-Royer, E. M., Almeroth, K. C., & Suri, S. (2003). Towards<br />

realistic mobility models for mobile ad hoc networks Paper presented at the 9th<br />

annual international conference on Mobile computing and networking San<br />

Diego, CA, USA<br />

Jeffcoate, J., Chappell, C., & Feindt, S. (2002). Best practice in SME adoption <strong>of</strong> ecommerce.<br />

Benchmarking: An International Journal, 9(2).<br />

Karygiannis, T., & Owens, L. (2002). Wireless Network Security 802.11, Bluetooth and<br />

Handheld Devices. Retrieved June 8, 2007, from<br />

http://cnscenter.future.co.kr/resource/crypto/standard/fips/NIST_SP_800-48.pdf<br />

Kotilainen, N., Vapa, M., Keltanen, T., Auvinen, A., & Vuori, J. (2006, 8-9 June).<br />

P2PRealm - Peer-to-peer network simulator. Paper presented at the 11th<br />

Intenational <strong>Work</strong>shop on Computer-Aided Modeling, Analysis and Design <strong>of</strong><br />

Communication Links and Networks.<br />

Laet, G. D., & Schauwers, G. (2005). Network security fundamentals. Indianapolis:<br />

Cisco Press.<br />

Landoll, D. J. (2006). The security risk assessment handbook. Boca Raton, FL:<br />

Auerbach Publication.<br />

Levy, M., Powell, P., & Worrall, L. (2005). Strategic intent and e-business in SMEs:<br />

Enabler and inhibitors. Information Resources Management Journal, 18(4), 1-20.<br />

Lim, Y. X., Schmoyer, T., Levine, J., & Owen, H. L. (2003, 18-20 June). Wireless<br />

intrusion detection and response. Paper presented at the 2003 IEEE <strong>Work</strong>shops<br />

on Information Assurance, West Point, USA.<br />

Loeb, L. (2005). WPA: It's like WEP, but good. Retrieved 29 Mar, 2006, from<br />

http://www.security.ithub.com/article/WPA+Its+like+WEP+but+Good/163390_<br />

1.aspx<br />

MANIACS. (n.d.). GTNETS. Retrieved 12 May, 2007, from<br />

http://www.ece.gatech.edu/research/labs/MANIACS/GTNetS/<br />

Maple, C., Jacobs, H., & Reeve, M. (2006). Choosing the right wireless LAN security<br />

protocol for home and business user. Paper presented at the First international<br />

conference on availability, reliability and security.<br />

Markus, B. (2004). Network modelling and evaluation tools for higher education.<br />

Retrieved June 30, 2007, from<br />

http://nsl.csie.nctu.edu.tw/NCTUnsReferences/Bernat_Markus.pdf<br />

Matsunaga, Y., Merino, A. S., Suzuki, T., & Katz, R. H. (2003). Secure authentication<br />

system for public WLAN roaming Paper presented at the 1st ACM international<br />

workshop on wireless mobile applications and services on WLAN hotspots San<br />

Diego, CA, USA.<br />

McCullough, J. (2004). Caution! Wireless networking: Preventing a data disaster.<br />

Hoboken: Wiley Publishing Inc.<br />

49

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!