AIS300 - Scheme of Work - Scholarly Commons Home
AIS300 - Scheme of Work - Scholarly Commons Home
AIS300 - Scheme of Work - Scholarly Commons Home
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Miller, S. K. (2001). Facing the challenge <strong>of</strong> wireless security. Computer, 34(7), 16-18.<br />
Myerson, J. M. (2002). Identifying enterprise network vulnerabilities. International<br />
Journal <strong>of</strong> Network Management, 12, 135-144.<br />
Netgear Inc. (2005a). WEP Open System Authentication. Retrieved June 30, 2007,<br />
from<br />
http://documentation.netgear.com/reference/fra/wireless/WirelessNetworkingBa<br />
sics-3-08.html<br />
Netgear Inc. (2005b). WEP Shared Key Authentication. Retrieved June 30, 2007, from<br />
http://documentation.netgear.com/reference/fra/wireless/WirelessNetworkingBa<br />
sics-3-09.html<br />
Netstumbler. (2007). About. Retrieved March 10, 2007, from<br />
http://www.netstumbler.com/about/<br />
Nieuwelaar, M. v. d., & Hunt, R. (2004). Real-time carrier network traffic measurement,<br />
visualisation and topology modelling. Computer Communications, 27(1), 128-<br />
140.<br />
Opnet. (2007). Modeler wireless suite. Retrieved 20 April, 2007, from<br />
http://www.opnet.com/products/modeler/home-1.html<br />
Panko, R. R. (2004). Corporate computer and network security. New Jersey: Pearson<br />
Prentice Hall.<br />
Park, J. S., & Dicoi, D. (2003). WLAN security: current and future. IEEE Internet<br />
Computing, 7(5), 60-65.<br />
Pawlikowski, K., Jeong, H.-D. J., & Lee, J.-S. R. (2002). On credibility <strong>of</strong> simulation<br />
studies <strong>of</strong> telecommunication networks. IEEE Communication, 132-139.<br />
Perrone, L. F., Yuan, Y., & Nicol, D. M. (2003). Simulation <strong>of</strong> large scale networks II:<br />
modeling and simulation best practices for wireless ad hoc networks Paper<br />
presented at the 35th conference on winter simulation: driving innovation New<br />
Orleans, Louisiana<br />
Riley, G. F. (2003). The Georgia Tech network simulator. Paper presented at the ACM<br />
SIGCOMM 2003 workshop.<br />
Sathu, H. (2006). Wardriving dilemmas. Paper presented at the 19th Annual Conference<br />
<strong>of</strong> the National Advisory Committee on Computing Qualifications, Wellington,<br />
NZ.<br />
Scalable Network Technologies. (2007). QualNet Developer. Retrieved 20 April, 2007,<br />
from http://www.qualnet.com/products/developer.php<br />
Schafer, G. (2003). Security in fixed and wireless network (H. J. v. Schmoeger, Trans.).<br />
Berlin: John Wiley and Sons.<br />
50