|
一、中文部份 [1]友訊(D-Link)技術團隊,文魁資訊,無線區域網路技術白皮書,2005,ISBN:986-125-599-0, pp.6-8 - 6-10 [2]財團法人資訊工業策進會,經濟部技術處,全球新興「無線城市」發展現況分析,經濟部技術處產業技術知識服務計畫,ISBN:978-957-581-384-0 [3]梁德馨 教授, TWNIC, “九十七年度台灣無線網路使用調查報告”, 全國意向顧問股份有限公司 二、英文部份 [1]A. Adya, V. Bahl, R. Chandra, and L. Qiu, “Architecture and Techniques for Diagnosing Faults”, ACM Mobicom, Sept. 2004. [2]Amran Ahmad, Suhaidi Hassan, “Detecting Rogue Access Point (RAP) using Simple Network Management Protocol (SNMP)”, International Conference on Network Applications, Protocols and Services 2008 [3]Bryan Pfaffenberger, Worldwide, Inc., Webster''s New World Dictionary of Computer Terms Eighth Edition, 957-40-0258-6 [4]Cisco Press, Cisco Systems, Inc., Cisco Networking Academy Program HP IT Essential 1: PC Hardware and Software Companion Guide Second Edition, 986-154-036-9 [5]Cricket Liu and Paul Albitz. Copyright 2006 O’Relly Media, Inc., DNS and BIND, Fifth Edition, 0-596-10057-4. [6]Diane Teare, Cisco Press, Cisco Systems, Inc., Designing Cisco Networks, 1st Edition, 986-7790-80-4 [7]Dino Schweitzer, Wayne Brown, ”Using Visualization to Locate Rogue Access Points”, 2007 Journal of Computing Sciences in Colleges, pp.134.140 [8]Douglas E. Comer, Pearson, TCP/IP Principles, Protocols, and Architecture, 5e [9]Godber, A., Dasgupta, P., “Countering rogues in wireless networks”, Parallel Processing Workshops, 2003, Proceedings. 2003 International Conference on, pp.425 – 431 [10]Graig Hunt. Copyright 1999 O’Relly Media, Inc., TCP/IP Network Administration, 2e, 957-8247-40-0. [11]Hongda Yin, Guanling Chen, Jie Wang, “Detecting protected layer-3 rogue APs”, Broadband Communications, Networks and Systems, 2007. BROADNETS 2007. Fourth International Conference on, pp.449-458 [12]Hyunuk Hwang, Gyeok Jung, Kiwook Sohn, Sangseo Park, “A Study on MITM (Man in the Middle) Vulnerability in Wireless Network Using 802.1X and EAP”, Information Science and Security, 2008. ICISS. International Conference on, pp.164 – 170 [13]Joel Scambray and George Kurtz, McGraw-Hill Companies, Inc., Hacking Exposed, Fifth Edition – Network Security Secrets & Solutions, 0-07-226081-5 [14]Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng, “RAP: Protecting Commodity Wi-Fi Networks from Rogue Access Points”, Proceedings of Qshine, 2007. [15]Mattbew S. Gast. Copyright 2006 O’Relly Media, Inc.,802.11 Wireless Networks: The Definitive Guide, 2e, 986-7794-72-9. [16]Microsoft Inc., Implementing a Microsoft Windows Server 2003 Network Infrastructure: Network Hosts Workbook, Microsoft Training & Certification [17]Microsoft Inc., Implementing, Management, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services Workbook, Microsoft Training & Certification [18]Mudhakar Srivatse, IBM T.J., Watson Research Center, “Who is Listening? Security in Wireless Networks”, Signal Processing, Communications and Networking, 2008. ICSCN ''08. International Conference on, pp.167.172 [19]P.Bahl, R. Chandra, J. Padhye, L. Ravindranath, M Singh, A. Wolman, and B. Zill, “Enhancing the Security of Corporate Wi-Fi Networks Using DAIR”, ACM MobiSys, 2006. [20]Raheem Beyah, Shantanu Kangude, George Yu, Brian Strickland, and John Copeland, “Rogue Access Point Detection using Temporal Traffic Characteristics”, IEEE GLOBECOM, 2004. [21]Roberta Bragg, Mark Rhodes-Ousley, Kenith Strassberg, McGraw-Hill Companies, Inc., Networking Security: The Complete Reference, 957-493-992-8 [22]Rolf Oppiger, Ralf Hauser, David Basin, “SSL/TLS Session-Aware User Authentication”, 2008 IEEE Computer Society, pp.59-65 [23]Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kurose, Don Towsley, “Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs”, Internet Measurement Conference, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, pp.365-378 三、網站部份 [1]American Banker Security Watch, http://www.americanbanker.com/security-watch.html [2]Bruce Schneier., Mudgo., “Cryptanalysis of Microsoft''s Point-to-Point Tunneling Protocol (PPTP)” http://www.schneier.com/paper-pptp.html [3]Bruce Schneier., Mudgo., David Wagner.(UC Berkeley), “Cryptanalysis of Microsoft''s PPTP Authentication Extensions (MS-CHAPv2)” , http://www.schneier.com/paper-pptpv2.html [4]CERT/CC (Computer Emergency Resource Team / Coordination Center). http://www.cert.org [5]CERT/CC, “Over-Confidence is Pervasive Amongst Security Professionals” [6]Cisco Systems, http://www.cisco.com.tw [7]eTForecasts. http://www.etforecasts.com [8]FCC (Federal Communications Commission). http://www.fcc.gov [9]IETF (Internet Engineering Task Force). http://www.ietf.org [10]Internet World Stats. http://www.internetworldstats.com [11]Microsoft TechNet http://technet.microsoft.com/zh-tw/default.aspx [12]OpenDNS http://www.opendns.com [13]Paul Moceri., Troy Ruths., “Cafe Crack: Attacks on Unsecured Wireless Networks”, Washington University, http://www.cse.wustl.edu/~jain/cse571-07/ftp/cafecrack [14]RFCs (Request for Comments). http://www.rfc-editor.org [15]TWCERT/CC (Taiwan Computer Emergency Resource Team / Coordination Center). http://www.cert.org.tw [16]TWNIC (Taiwan Network Information Center). http://www.twnic.net.tw [17]Wi-Fi Alliance. http://www.wi-fi.org [18]Wireshark http://www.wireshark.org
|