9.16 Endnotes


9.16 Endnotes

1. Sun-tzu. The Art of War , Chapter 3. Seattle, WA: Clearbridge Publishing, 2002 .

2. Consult URL http://www.netstumbler.com/nation.php for a map of wireless access points.

3. The URL for this story is http://www.computerworld.com/mobiletopics/mobile/story.html .

4. See http://www.arstechnica.com/wankerdesk/3q02/warflying-1.html .

5. See http://www.kismetwireless.net .

6. For further details, see http://www.wildpackets.com/products/airopeek .

7. For further details, see http://www.networkassociates.com/us/products/sniffer/field/snifferbasic.htm .

8. Sourceforge 's URL is http://ettercap.sourceforge.net .

9. Instructions to do this can be found at http://www.technet.com .

10. See http://www.atstake.com/research/lc .

11. Material in this section is excerpted from the Cybersecurity Operations Handbook , by John W. Rittinghouse and William M. Hancock, New York: Digital Press, 2003 . Reprinted with permission.

12. See http://www.anti-spy.com .




Wireless Operational Security
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net