References

[bib-01] Aircrack-ng. http://www.aircrack-ng.org/ (accessed March 2010).

[bib-02] Aircrack-ng. Basic documentation (Aircrack-ng, September 9, 2009). http://www.aircrack-ng.org/doku.php?id=getting_started/ (accessed March 2010).

[bib-03] AirTight Networks. "WPA/WPA2 TKIP Attack" (AirTight Networks, 2010). http://www.airtightnetworks.com/home/resources/knowledge-center/wpa-wpa2-tkip-attack.html (accessed April 9, 2010).

[bib-04] Ron Aitchison,. Pro DNS and BIND. Berkeley, CA: Apress, 2005. http://www.zytrax.com/books/dns/ (accessed April 6, 2010).

[bib-05] Amazon Elastic Compute Cloud (Amazon EC2). Amazon Web Services. http://aws.amazon.com/ec2/ (accessed April 14, 2010).

[bib-06] Jay Beale,, and Russ Rogers. Nessus Network Auditing, 2nd ed. ...

Get Security Strategies in Linux Platforms and Applications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.