References
[1]. Ali, F. (2008). IP Spoofing. The Internet Protocol Journal,
Volume 10, No. 4. Retrieved January 30, 2011, from
http://www.cisco.com/web/about/ac123/ac147/archived
_issues/ipj_10-4/104_ip-spoofing.html.
[2]. Bowman, B. (2003). WPA Wireless Security for Home
Networks. Retrieved February 5, 2011, from
http://60.250.34.222/windowsxp/using/networking/expert/
bowman_03july28.mspx.
[3]. Brodkin, J. (2011). Windows drops below 90% market
share. Network World, January13, 2011. Retrieved January
29, 2011, from http://www.networkworld.com/community/
blog/windows-drops-below-90-market-share.
[4]. Butler, E. (2010). Firesheep. Codebutler. Retrieved
January 28, 2011, from http://codebutler.com/firesheep.
[5]. Cayirci, E., & Rong, C. (2009). Security in Wireless Ad Hoc
and Sensor Network. The Atrium, Southern Gate, Chichester,
West Sussex, United Kingdom: John Wiley & Sons Ltd.
[6]. Ciampa, M. (2006). CWNA Guide to Wireless LANs,
Second Edition. 25 Thompson Place, Boston, MA:
Thompson Course Technology.
[7]. Cisco. (2010). Chapter 6 – Configuring Radio Setting.
Enabling and Disabling Public Secure Packet Forwarding.
Cisco IOS Software Configuration Guide for Cisco Aironet
Access Points Cisco IOS Releases 12.4(10b)JA and
12.3(8)JEC. Retrieved Januar y 30, 2011 from
http://www.cisco.com/en/US/docs/wireless/access_point/1
2.4_10b_JA/configuration/guide/scg12410b-chap6-
radio.html#wp1038494.
[8]. Cisco. (2011). Cisco Unified Wireless Network Solutions
Guide: The Benefits of Cisco Unified Wireless Network
Mobility Services for Educational Institutions. Cisco Aironet
1500 Series. Retrieved Januar y 30, 2011, from
http://www.cisco.com/en/US/prod/collateral/wireless/ps56
79/ps6548/prod_brochure0900aecd80565d2d.html#wp
9000004.
[9]. Cross, M. (2008). Scene of the Cybercrime, Second
Edition. 30 Corporate Drive, Burlington, MA: Syngress
Publishing, Inc.
[10]. Di Pasquale, A. (2011). ArpOn – Arp handler inspectiON. ARPON. Retrieved January 30, 2011, from
http://arpon.sourceforge.net/.
[11]. Gahran, A. (2010). Using Wi-Fi? Firesheep may
endanger your security. CNNTech, November 01, 2010.
Retrieved January 28, 2011, from http://articles.cnn.com/
2010-11-01/tech/firesheep.wifi.security_1_firesheepfirefox-
wi-fi-social-networking-sites-firefox-extensionsecurity?_
s=PM:TECH.
[12]. Graves, K. (2007). CEH: Official Certified Ethical
Hacker Review Guide: Exam 312-50. 10475 Crosspoint
Blvd., Indianapolis, IN: Wiley Publishing.
[13]. Kendrick, J. (2010). Smartphone Wi-Fi Usage on the
Rise. GIGAOM, August 24, 2010. Retrieved February 29,
2011, from http://gigaom.com/mobile/smartphone-wi-fiusage-
on-the-rise/.
[14]. Leonhard, W. (2010). 'Sidejacking' browser add-on
stumps security experts. InfoWorld, November 10, 2011.
Retrieved March 20, 2011, from http://www.infoworld.com/
t/endpoint-security/sidejacking-browser-add-stumpssecurity-
experts-790.
[15]. Marcus, D. (2010). I'll take the Firesheep with a side
order of ARP Poisoning please. McAfee Labs Blog Central,
October 25, 2010. Retrieved January 28, 2011, from
http://blogs.mcafee.com/mcafee-labs/ill-take-thefiresheep-
with-a-side-order-of-arp-poisoning-please.
[16]. Miller, D., & Gregg, M. (2011). Security Administrator
Street Smarts: A Real World Guide to CompTIA Security+
Skills, 3rd Edition. 10475 Crosspoint Blvd., Indianapolis, IN:
Wiley Publishing.
[17]. Orebaugh, A. (2007). Wireshark and Ethereal Network Protocol Analyzer Toolkit. 800 Hingham Street, Rockland,
MA: Syngress Publishing, Inc.
[18]. Oxid. (2011). Cain & Abel.OXID.it. Retrieved February
2, 2011, from http://www.oxid.it/cain.html
[19]. Putman, B. (2005). 802.11 WLAN Hands-On Analysis:
Unleashing the Network Monitor for Troubleshooting and
Optimization. 1663 Liberty Drive, Bloomington, IN: Authorhouse.
[20]. Rittinghouse, J. W., & Ransome, J. F. (2004). Wireless
Operational Security. 200 Wheeler Road, Burlingtton, MA:
Digital Press.
[21]. Sanders, C. (2010). Understanding Man-In-The-Middle
Attacks - Part 4: SSL Hijacking. WindowSecurity.com, June
09, 2010. Retrieved May 3, 2011, from
http://www.windowsecurity.com/articles/Understanding-
Man-in-the-Middle-Attacks-ARP-Part4.html.
[22]. Umar, A. (1993). Distributed Computing and Client-
Server Systems. Englewood Cliffs, NJ: PrenticeHall PTR,
Prentice-Hall, Inc.
[23]. Vaughan-Nichols, S. (2010). Herding Firesheep.
ZDNet: Networking, November 1, 2010. Retrieved January
28, 2011, from http://www.zdnet.com/blog/networking/
herding-firesheep/293.
[24]. Wallingford, T. (2006). VoIP Hacks. 1005 Gravenstein
Highway North, Sebastopol, CA: O'Reilly Media.
[25]. WeFi. (2011). About WeFi. WeFi. Retrieved January 30,
2011, from http://www.wefi.com/about/.
[26]. Wireshark. (2011). Wireshark – Go Deep. Wireshark
Foundation. Retrieved Februar y 2, 2011, from
http://www.wireshark.org/about.html.