AIS300 - Scheme of Work - Scholarly Commons Home
AIS300 - Scheme of Work - Scholarly Commons Home
AIS300 - Scheme of Work - Scholarly Commons Home
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Jardosh, A., Belding-Royer, E. M., Almeroth, K. C., & Suri, S. (2003). Towards<br />
realistic mobility models for mobile ad hoc networks Paper presented at the 9th<br />
annual international conference on Mobile computing and networking San<br />
Diego, CA, USA<br />
Jeffcoate, J., Chappell, C., & Feindt, S. (2002). Best practice in SME adoption <strong>of</strong> ecommerce.<br />
Benchmarking: An International Journal, 9(2).<br />
Karygiannis, T., & Owens, L. (2002). Wireless Network Security 802.11, Bluetooth and<br />
Handheld Devices. Retrieved June 8, 2007, from<br />
http://cnscenter.future.co.kr/resource/crypto/standard/fips/NIST_SP_800-48.pdf<br />
Kotilainen, N., Vapa, M., Keltanen, T., Auvinen, A., & Vuori, J. (2006, 8-9 June).<br />
P2PRealm - Peer-to-peer network simulator. Paper presented at the 11th<br />
Intenational <strong>Work</strong>shop on Computer-Aided Modeling, Analysis and Design <strong>of</strong><br />
Communication Links and Networks.<br />
Laet, G. D., & Schauwers, G. (2005). Network security fundamentals. Indianapolis:<br />
Cisco Press.<br />
Landoll, D. J. (2006). The security risk assessment handbook. Boca Raton, FL:<br />
Auerbach Publication.<br />
Levy, M., Powell, P., & Worrall, L. (2005). Strategic intent and e-business in SMEs:<br />
Enabler and inhibitors. Information Resources Management Journal, 18(4), 1-20.<br />
Lim, Y. X., Schmoyer, T., Levine, J., & Owen, H. L. (2003, 18-20 June). Wireless<br />
intrusion detection and response. Paper presented at the 2003 IEEE <strong>Work</strong>shops<br />
on Information Assurance, West Point, USA.<br />
Loeb, L. (2005). WPA: It's like WEP, but good. Retrieved 29 Mar, 2006, from<br />
http://www.security.ithub.com/article/WPA+Its+like+WEP+but+Good/163390_<br />
1.aspx<br />
MANIACS. (n.d.). GTNETS. Retrieved 12 May, 2007, from<br />
http://www.ece.gatech.edu/research/labs/MANIACS/GTNetS/<br />
Maple, C., Jacobs, H., & Reeve, M. (2006). Choosing the right wireless LAN security<br />
protocol for home and business user. Paper presented at the First international<br />
conference on availability, reliability and security.<br />
Markus, B. (2004). Network modelling and evaluation tools for higher education.<br />
Retrieved June 30, 2007, from<br />
http://nsl.csie.nctu.edu.tw/NCTUnsReferences/Bernat_Markus.pdf<br />
Matsunaga, Y., Merino, A. S., Suzuki, T., & Katz, R. H. (2003). Secure authentication<br />
system for public WLAN roaming Paper presented at the 1st ACM international<br />
workshop on wireless mobile applications and services on WLAN hotspots San<br />
Diego, CA, USA.<br />
McCullough, J. (2004). Caution! Wireless networking: Preventing a data disaster.<br />
Hoboken: Wiley Publishing Inc.<br />
49