Thumbnail
Access Restriction
Subscribed

Author Berghel, Hal
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Abstract Although WiFi technology security vulnerabilities are well known, the extent of these vulnerabilities may be surprising: War driving experiences identify many potential points of entry.
Description Affiliation: UNLV School of Computer Science and National Identity Theft and Financial Fraud Research and Operations Center (Berghel, Hal)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-01
Publisher Place New York
Journal Communications of the ACM (CACM)
Volume Number 47
Issue Number 9
Page Count 6
Starting Page 21
Ending Page 26


Open content in new tab

   Open content in new tab
Source: ACM Digital Library