Wireless Operational Security

9.16 Endnotes

1. Sun-tzu. The Art of War , Chapter 3. Seattle, WA: Clearbridge Publishing, 2002 .

2. Consult URL http://www.netstumbler.com/nation.php for a map of wireless access points.

3. The URL for this story is http://www.computerworld.com/mobiletopics/mobile/story.html .

4. See http://www.arstechnica.com/wankerdesk/3q02/warflying-1.html .

5. See http://www.kismetwireless.net .

6. For further details, see http://www.wildpackets.com/products/airopeek .

7. For further details, see http://www.networkassociates.com/us/products/sniffer/field/snifferbasic.htm .

8. Sourceforge 's URL is http://ettercap.sourceforge.net .

9. Instructions to do this can be found at http://www.technet.com .

10. See http://www.atstake.com/research/lc .

11. Material in this section is excerpted from the Cybersecurity Operations Handbook , by John W. Rittinghouse and William M. Hancock, New York: Digital Press, 2003 . Reprinted with permission.

12. See http://www.anti-spy.com .

Категории