Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
5. References
Jerry Malcolm, “Security Risks In The Wireless Computing Environment,” Copyright © 1998–2005 HNS, All rights reserved., HNS, [Malcolm Systems Services, 8302 S. Jamestown Ave., Tulsa, Oklahoma 74137], December 22, 2004.
“Wireless Security Recommendations For Rutgers,” © 2005 Rutgers, The State University of New Jersey. All rights reserved. Office of Information Technology, Davidson Hall 181, New Brunswick/Piscataway, New Jersey 732/445-2729, May 18, 2005.
John R. Vacca, Firewalls: Jumpstart for Network and Systems Administrators, Digital Press, 2004.
John R. Vacca, Identity Theft. Prentice Hall, 2002.
Rights and permissions
Copyright information
© 2006 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2006). Summary, Conclusions and Recommendations. In: Guide to Wireless Network Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-29845-0_32
Download citation
DOI: https://doi.org/10.1007/978-0-387-29845-0_32
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-95425-7
Online ISBN: 978-0-387-29845-0
eBook Packages: Computer ScienceComputer Science (R0)