Bibliography

[ch14biblio01entry01] 1 Intelligraphics. “Introduction to IEEE 802.11.” http://www.intelligraphics.com/articles/80211_article.html. December 2001.

[ch14biblio01entry02] 2 Jim Zyren and Al Petrick. “IEEE 802.11 Tutorial.” http://www.packetnexus.com/docs/IEEE_80211_Primer.pdf. December 2001.

[ch14biblio01entry03] 3 Bob Fleck and Jordan Dimov. “Wireless Access Points and ARP Poisoning.” http://www.cigitallabs.com/resources/papers/download/arppoison.pdf. December 2001.

[ch14biblio01entry04] 4 Wireless Ethernet Compatibility Alliance. “802.11b Wired Equivalent Privacy (WEP) Security.” February 19, 2001. http://www.wi-fi.net/pdf/Wi-FiWEPSecurity.pdf. December 2001.

[ch14biblio01entry05] 5 Craig Ellison. “Exploiting and Protecting 802.11b Wireless ...

Get Inside Network Perimeter Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.