The Definitive Guide To Wireless WarX'ing Wireless is Not the Problem
Wardriving HOWTO (Un-official) 802.11a: An Excellent Long Term Solution
FBI
releases advisory about 802.11-spotting "wardriving"
802.11 Alphabet Soup
(In)Security of the WEP algorithm
802.11 Security Beyond WEP
Unsafe at any key size; An analysis of the WEP encapsulation
802.11 WEP: Concepts and
Vulnerability
An Initial Security Analysis of the IEEE
802.1X Standard
Hacking Exposed - Chapter 10 - Wireless
Security
Wireless Networking: Compromising
Security for Convenience?
Assigning 802.11b Access Point Channels
Cisco Aironet Wireless Lan Security
Assess Requirements Before Designing
WLAN
A Guide to War Driving and Detecting War
Drivers
Wireless Access Points and ARP
Poisoning
Unsafe at any key size; An analysis of
the WEP encapsulation A Beginners Guide To Wireless Security
White Paper: Best Practices for
Deploying Wireless LANs
IEEE 802.1X Pre-Authentication (Slides)
Configuring a FreeBSD Access Point for your Wireless Network[cfreebsdwireless.txt - MISSING]
It Is Only Dialtone
Wireless Computing – A Technological
Breakthrough Laden with Risk?
EIRP Limitations for 802.11 WLANs[eirp802.11.txt - MISSING]
Wired Equivalent Privacy
Vulnerability
Getting the most
out of WEP
Analysis of WLAN Discovery
Applications for Intrusion Detection
Wireless LAN in London
Link Layer
and Network Layer Security for Wireless Networks
Minimizing 802.11 Interference Issues[m802.11ii.txt - MISSING]
Wireless Honeypots
Security in a
Wireless World
Sizing Up Your WLAN
Orinoco Technical Bulletin - WEP
Encryption
Return to The IIRG