Appleby, T.P., WAP — the wireless application protocol, White paper, Global Integrity.
Blake, R., Wireless Communication Technology, Delmar Thomson Learning, 2001.
Certicom, Complete WAP Security from Certicom, http://www.certicom.com.
CMP Media, Wireless devices present new security challenges — growth in wireless Internet access means handhelds will be targets of more attacks, October 21, 2000.
DeJesus, E.X., Wireless devices are flooding the airwaves with millions of bits of information. Securing those transmissions is the next challenge facing E-commerce, White paper, http://www.infosecuritymag.com, October 2000.
Harte, L. et al., Cellular and PCS: The Big Picture, McGraw-Hill, New York, 1997.
Howell, R. et al., Professional WAP, Wrox Press Ltd., Birmingham, 2000.
Izarek, S., Next-gen cell phones could be targets for viruses, http://www.foxnews.com, June 1, 2000.
Muller, N.J., Desktop Encyclopedia of Telecommunications, 2nd ed., McGraw-Hill, New York, 2000.
Nobel, C., Phone.com plugs WAP security hole, eWEEK, September 25, 2000.
Nokia, Secure Corporate WAP services: Nokia Activ Server, White paper, http://www.nokia.com.
Radding, A., Crossing the wireless security gap, http://www.computerworld.com, January 1, 2001.
Saarinen, M.-J., Attacks against the WAP WTLS Protocol, University of Jvyskyl, Finland.
Saita, A., Case study: securing thin air, academia seeks better security solutions for handheld wireless devices, http://www.infosecuritymag.com, April 2001.
Schwartz, E., Two-zone wireless security system creates a big hole in your communications, http://www.infoworld.com, November 6, 2000.
Tulloch, M., Microsoft Encyclopedia of Networking, Microsoft Press, Redmond, WA, 2000.
Unstrung.com, Does Java solve worldwide WAP wait?, http://www.unstrung.com, April 9, 2001.
Van der Heijden, M. and Taylor, M., Understanding WAP: Wireless Applications, Devices, and Services, Artech House Publishers, 2000.