Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
3Activity
0 of .
Results for:
No results containing your search query
P. 1
Wi-Fi Security: Protecting Insecure Channels

Wi-Fi Security: Protecting Insecure Channels

Ratings: (0)|Views: 103|Likes:
Published by Noora Al Shehhi
Wi-Fi Security: Protecting Insecure Channels
Wi-Fi Security: Protecting Insecure Channels

More info:

Published by: Noora Al Shehhi on Apr 08, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

02/15/2013

pdf

text

original

 
Wi-Fi Security: Protecting Insecure Channels
Outline:
1.
Title page
- Name, Capstone Project title, date, advisor and courseinstructor.
2.
 Abstract
- Concise description of principle accomplishments or results.
3.Copyright page
4.
Introduction
- Includes background (text the reader needs to know tounderstand the research work), context (what has been done or iscurrently being done by others, and how the student contribution fittogether with and contribute to previous efforts?), and motivation (why isthis research study important?).
5.
 Methodology 
— Description of the technical details of the student worksthat has been reviewed by experts in the field.
6.
Results and Discussion
– Explanation of the data and observations gatheredin the research and their interpretation. This also includes the discussionof the data, the significance and relation to a broader context. Results anddiscussion sections can be put together or placed in separate paragraphsas per the student choice.
 
7.
Conclusions
– Includes summary of the main conclusions of the researchwork and possibly suggest future research directions.
8.
References
– Includes bibliographic references to existing literaturedescribed in the introduction. The format of the reference section shouldbe that directed by the advisor.
9.
 Acknowledgements
– To contributors and others.
The below are the references for Wi-Fi Security: Protecting Insecure Channelsproject. The below references will help you to get start working on writing the projectof 30 pages.1) Background
http://www.sysdesign.ca/archive/networksecurity2009.pdf 
http://www.wlug.org/files/wifi-security.pdf 2) Methodology
Page 1 of 6
 
Wi-Fi Security: Protecting Insecure Channels
http://books.google.ae/books?id=eZ4cCsfaXyUC&pg=PA48&dq=advantages+and+disadvantages+Primary+Research+method&hl=en&sa=X&ei=qw2AT_ipDuOQ0AWWzsnpBg&redir_esc=y#v=onepage&q=advantages%20and%20disadvantages%20Primary%20Research%20method&f=false
http://books.google.ae/books?id=wY2bSaEm8l8C&pg=PA127&dq=advantages+and+disadvantages+Primary+Research+method&hl=en&sa=X&ei=qw2AT_ipDuOQ0AWWzsnpBg&redir_esc=y#v=onepage&q=advantages%20and%20disadvantages%20Primary%20Research%20method&f=false3) Findings
http://mysbfiles.stonybrook.edu/~mlayer/cse102/HW3.html
http://www.openitmag.com/2011/07/wi-fi-security/
http://www.guardmyip.com/wifi-hotspot-security.html
http://www.complexnetworks.fr/security-modes-of-wi-fi-access-points-in-paris/
http://fanaticmedia.com/infosecurity/archive/Feb10/5-Wireless-Security-Threats_v2.htm
http://infosecawareness.in/downloads/handbooks/wifi-security-ebook.pdf 
Page 2 of 6
 
Wi-Fi Security: Protecting Insecure Channels
http://java.uom.gr/~chalkias/e107_files/public/wifi-security_FINAL_chalkias.pdf 
http://books.google.ae/books?id=rLRgMdjwzxsC&pg=PA57&dq=Wifi+Security:+Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_ 5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting%20insecure%20Channels&f=false
http://www.hsc.fr/ressources/articles/hakin9_wifi/hakin9_wifi_EN.pdf 
http://books.google.ae/books?id=QuISwdREL1sC&pg=PT425&dq=Wifi+Security:+Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_ 5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting%20insecure%20Channels&f=false
http://www.airtightnetworks.com/fileadmin/pdf/resources/WiFi_Security_Best_Practices.pdf 
http://books.google.ae/books?id=-T7RRtAxRJ8C&pg=PA326&dq=Wifi+Security:+Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_ 5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting%20insecure%20Channels&f=false
http://www.staysmartonline.gov.au/__data/assets/pdf_file/0004/19525/F17 _wi-fi_security.pdf 
Page 3 of 6

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->