O'Reilly logo

Network and Data Security for Non-Engineers by Stephan S. Jones, Kevin Groom, Frank M. Groom

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Bibliography

Ahmad, J., Garrison, B., Gruen, J., Kelly, C., and Pankey, H. (2003). 4G wireless systems. Next-Generation Wireless Working Group.

Ahmadi, S. (2009). An overview of next-generation mobile WiMAX technology. IEEE Communications Magazine, 84–98.

Ahmed, B. and Feroze, Z. (2009). 3G Cellular Network. Sweden: School of Engineering at Blekinge Institute of Technology, MEE09: 25.

Ahuja, S. and Collier, N. (2010). An assessment of WiMAX security. CN Communications and Network (2), 134–137.

Akin, D. (2005, May 1). 802.11i authentication and key management (AKM). Retrieved October 27, 2015, from https://www.cwnp.com/uploads/802–11i_key_management.pdf.

Andrews, J. G., Buzzi, S., Choi, W., Hanly, S. V., Lozano, A., Soong, A. C., and Zhang, J. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required