Page 264 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 264

Wireless Networks




                    Notes          14.10 Further Readings



                                   Books       Glisic, Savo & Lorenzo, Beatriz (2009). “Advanced Wireless Networks: Cognitive,
                                               Cooperative & Opportunistic 4G Technology.” John Wiley & Sons.
                                               Rackley, Steve (2011). “Wireless Networking Technology:  From Principles to
                                               Successful Implementation.” Elsevier.
                                               Syngress (2001). “Designing A Wireless Network”. Syngress.
                                               Pan, Yi & Xiao, Yang (2005). “Design and Analysis of Wireless Networks.” Nova
                                               Publishers.
                                               Golmie. “Coexistence in Wireless Networks.” Cambridge University Press.
                                               Stojmenovic  (2006). “Handbook of Wireless Networks & Mobile Computing.”
                                               John Wiley & Sons.


                                   Online links   http://people.duke.edu/~rob/kerberos/authvauth.html

                                               http://pic.dhe.ibm.com/infocenter/aix/v7r1/index.jsp?topic=%2Fcom.ibm.aix.
                                               security%2Fdoc%2Fsecurity%2Fuser_authentication.htm
                                               http://msdn.microsoft.com/en-us/library/cc838351.aspx#_Architectural_
                                               Perspectives
                                               http://www.cisco.com/warp/public/cc/pd/witc/ao1200ap/prodlit/wswpf_
                                               wp.pdf

                                               http://yourbusiness.azcentral.com/enable-mac-address-filtering-18969.html
                                               http://technet.microsoft.com/en-us/library/aa998077(v=exchg.65).aspx
                                               http://www.networkworld.com/news/2010/0506whatisit.html
                                               http://omnitraining.net/security/198-increase-security-with-proper-
                                               authentication-policies
































          258                              LOVELY PROFESSIONAL UNIVERSITY
   259   260   261   262   263   264   265