Bibliography
[ch14biblio01entry01] 1 . “Introduction to IEEE 802.11.” http://www.intelligraphics.com/articles/80211_article.html. December 2001.
[ch14biblio01entry02] 2 and . “IEEE 802.11 Tutorial.” http://www.packetnexus.com/docs/IEEE_80211_Primer.pdf. December 2001.
[ch14biblio01entry03] 3 and . “Wireless Access Points and ARP Poisoning.” http://www.cigitallabs.com/resources/papers/download/arppoison.pdf. December 2001.
[ch14biblio01entry04] 4 . “802.11b Wired Equivalent Privacy (WEP) Security.” February 19, 2001. http://www.wi-fi.net/pdf/Wi-FiWEPSecurity.pdf. December 2001.
[ch14biblio01entry05] 5 . “Exploiting and Protecting 802.11b Wireless ...
Get Inside Network Perimeter Security, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.