WarDriving: Drive, Detect, Defend, A Guide to Wireless Security
WarDriving: Drive, Detect, Defend, A Guide to Wireless Security
Wireless infidelity I: war driving
Communications of the ACM - End-user development: tools that empower users to create their own software solutions
Queue - Mobile Computing
Communications of the ACM - Spyware
Competitive advantage from mandatory investments: An empirical study of Australian firms
The Journal of Strategic Information Systems
Hi-index | 48.22 |
Unauthorized users risk civil and criminal liability; Wi-Fi network providers risk system intrusion and disruption.