09.11.2012 Views

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Miller, S. K. (2001). Facing the challenge <strong>of</strong> wireless security. Computer, 34(7), 16-18.<br />

Myerson, J. M. (2002). Identifying enterprise network vulnerabilities. International<br />

Journal <strong>of</strong> Network Management, 12, 135-144.<br />

Netgear Inc. (2005a). WEP Open System Authentication. Retrieved June 30, 2007,<br />

from<br />

http://documentation.netgear.com/reference/fra/wireless/WirelessNetworkingBa<br />

sics-3-08.html<br />

Netgear Inc. (2005b). WEP Shared Key Authentication. Retrieved June 30, 2007, from<br />

http://documentation.netgear.com/reference/fra/wireless/WirelessNetworkingBa<br />

sics-3-09.html<br />

Netstumbler. (2007). About. Retrieved March 10, 2007, from<br />

http://www.netstumbler.com/about/<br />

Nieuwelaar, M. v. d., & Hunt, R. (2004). Real-time carrier network traffic measurement,<br />

visualisation and topology modelling. Computer Communications, 27(1), 128-<br />

140.<br />

Opnet. (2007). Modeler wireless suite. Retrieved 20 April, 2007, from<br />

http://www.opnet.com/products/modeler/home-1.html<br />

Panko, R. R. (2004). Corporate computer and network security. New Jersey: Pearson<br />

Prentice Hall.<br />

Park, J. S., & Dicoi, D. (2003). WLAN security: current and future. IEEE Internet<br />

Computing, 7(5), 60-65.<br />

Pawlikowski, K., Jeong, H.-D. J., & Lee, J.-S. R. (2002). On credibility <strong>of</strong> simulation<br />

studies <strong>of</strong> telecommunication networks. IEEE Communication, 132-139.<br />

Perrone, L. F., Yuan, Y., & Nicol, D. M. (2003). Simulation <strong>of</strong> large scale networks II:<br />

modeling and simulation best practices for wireless ad hoc networks Paper<br />

presented at the 35th conference on winter simulation: driving innovation New<br />

Orleans, Louisiana<br />

Riley, G. F. (2003). The Georgia Tech network simulator. Paper presented at the ACM<br />

SIGCOMM 2003 workshop.<br />

Sathu, H. (2006). Wardriving dilemmas. Paper presented at the 19th Annual Conference<br />

<strong>of</strong> the National Advisory Committee on Computing Qualifications, Wellington,<br />

NZ.<br />

Scalable Network Technologies. (2007). QualNet Developer. Retrieved 20 April, 2007,<br />

from http://www.qualnet.com/products/developer.php<br />

Schafer, G. (2003). Security in fixed and wireless network (H. J. v. Schmoeger, Trans.).<br />

Berlin: John Wiley and Sons.<br />

50

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!