Wireless LAN setup and security loopholes

Hdl Handle:
http://hdl.handle.net/10149/306955
Title:
Wireless LAN setup and security loopholes
Book Title:
Electronic business: concepts, methodologies, tools, and applications
Authors:
Issac, B. (Biju)
Affiliation:
Teesside University. School of Computing.
Citation:
Issac, B., Lawan A. (2008) 'Wireless LAN setup and security loopholes' in Lee (ed) Electronic Business: Concepts, Methodologies, Tools, and Applications; doi:10.4018/978-1-60566-056-1 [accessed December 17, 2013]
Publisher:
IGI Global
Issue Date:
1-Dec-2008
URI:
http://hdl.handle.net/10149/306955
DOI:
10.4018/978-1-60566-056-1
Additional Links:
http://www.igi-global.com/chapter/wireless-lan-setup-security-loopholes/9404
Type:
Book Chapter
Language:
en

Full metadata record

DC FieldValue Language
dc.contributor.authorIssac, B. (Biju)en_GB
dc.date.accessioned2013-12-17T10:50:42Zen
dc.date.available2013-12-17T10:50:42Zen
dc.date.issued2008-12-01en
dc.identifier.doi10.4018/978-1-60566-056-1en
dc.identifier.urihttp://hdl.handle.net/10149/306955en
dc.language.isoenen
dc.publisherIGI Globalen_GB
dc.relation.urlhttp://www.igi-global.com/chapter/wireless-lan-setup-security-loopholes/9404en_GB
dc.titleWireless LAN setup and security loopholesen
dc.typeBook Chapteren
dc.contributor.departmentTeesside University. School of Computing.en_GB
dc.title.bookElectronic business: concepts, methodologies, tools, and applicationsen_GB
or.citation.harvardIssac, B., Lawan A. (2008) 'Wireless LAN setup and security loopholes' in Lee (ed) Electronic Business: Concepts, Methodologies, Tools, and Applications; doi:10.4018/978-1-60566-056-1 [accessed December 17, 2013]en
All Items in TeesRep are protected by copyright, with all rights reserved, unless otherwise indicated.