References


Alliance, W.F. (2003). Wi-Fi protected access: An overview . Retrieved February 5, 2004, from http://www.wi-fi.org/OpenSection/pdf/Wi-Fi_Protected_Access_Overview.pdf

Al-Saleh, A. (2002). Secure, seamless roaming leads to an ideal wireless experience . Retrieved February 3, 2004, from http://www.tmcnet.com/bizwatch/articles/090402a.htm

Austin, R. (2001). The iPremier company (a): Denial of service attack. Harvard Business School, 9-601-114 (rev. June 13, 2002). Boston, MA: Harvard Business School Publishing.

Beach, G. (2003, April 1). Certify security. CIO Magazine, 12, 16. Cranite. (2003). WirelessWall technical operation white paper. Retrieved February 7, 2004, from http://www.cranite.com/pdf/whitepapers/wirelesswall-tech-op.pdf

Curtin, M., & Ranum, M.J. Internet firewalls: Frequently asked questions. Date: 2000/12/01 19:48:21. Revision: 10.0. Downloaded February 14, 2004 from http://www.faqs.org/faqs/firewalls-faq/

Farnan, J.E. Fighting fraud: Improving information security

Federal Bureau of Investigation, Washington, D.C. April 3, 2003. Downloaded on February 15, 2004 from http://www.fbi.gov/congress/congress03/farnan040303.htm

Fluhrer, S., Mantin, I., & Shamir, A. (2001). Weaknesses in the key scheduling algorithm of RC4. Eighth Annual Workshop on Selected Areas in Cryptography .

FTC. (2004). Report on consumer complaints.

Gehrke, R. (2003, November 6). Quick consumer notification key in identity theft cases, USA Today. Retrieved February 15, 2004 from http://www.usatoday.com/tech.news/internetprivacy/2003-11-06-id-theft-tips_x.htm

Gordon, B. (2003). 21 tips for improved wireless security. Unpublished.

IEEE. (2001). 802.11b-1999 Wireless LANs (802.11) . Retrieved February 4, 2004, from http://standards.ieee.org/reading/ieee/std/lanman/restricted/802.11b-1999.pdf

Karygiannis, T., & Owens, L. (2002). Wireless Network Security: 802.11, Bluetooth ¢ and handheld devices . Retrieved February 4, 2004, from http://csrc.nist.gov/ publications /drafts/draft-sp800-48.pdf

Kim, G., & Shin, J.G. (2003). Proposal for a secure wireless LAN system in which the RF signal is invisible to unauthorized observers and intruders.

Lewicki, R.J., & Bunker, B.B. (1996). Developing and maintaining trust in work relationships. In R.M. Kramer & T.R. Tyler (Eds.), Trust in organizations “ Frontiers of theory and research. London: Sage Publications.

Maconachy, W., Schou, C., Ragsdale, D., & Welch, D. (2001, June 5-6). A model for information assurance: An integrated approach. Proceedings of the 2001 IEEE Workshop on Information Assurance and Security. Figures 1 and 2 are also taken from this paper.

Musgrove, M. (2004, February 14). Tech experts downplay theft of windows code. Washington Post, E1.

Nolan, R. (2001, June 29). Q&A with Harvard Business School s Dr. Richard Nolan: IT business strategies in the network era. Harvard Business Review.

Reid, N., & Seide, R. (2003). 802.11 (Wi-Fi) Networking Handbook (p. 182). New York: McGraw-Hill.

Reiner, R. (Director). (1984). This Is Spinal Tap [Motion picture]. United States: Metro Goldwyn Mayer.

SetSolutions, Inc. (2004). Retrieved February 4, 2004 from http://www.setsolutions.com/security.html

Stubblefield, A., Ioannidis, J., & Rubin, A.D. (2001). Using the Fluhrer, Mantin, and Shamir attack to break WEP (No. TD-4ZCPZZ). AT&T Labs.




Information Technology Security. Advice from Experts
Information Technology Security. Advice from Experts
ISBN: 1591402484
EAN: N/A
Year: 2004
Pages: 113

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net