The myths and truths of wireless security
Communications of the ACM - Alternate reality gaming
Evaluation of network blocking algorithm based on ARP spoofing and its application
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
A network service access control framework based on network blocking algorithm
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Hi-index | 0.00 |
From the Publisher:Get full details on major mobile/wireless clients and operating systemsincluding Windows CE,Palm OS,UNIX,and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security the most trusted name in e-security this is your one-stop guide to wireless security.