參考文獻 |
中文部份
[余泰興 02] 余泰興, 無線網路之威脅與安全防護, 麥格羅.希爾國際出版公司, 2002年10月
[李序韡 03] 李序韡, 莊謙本, "MPLS架構新世代網路", 網路通訊雜誌141期, 2003年4月
[林秉忠 03] 林秉忠, 陳彥銘, "802.11無線網路白皮書", access from http://www.cert.org.tw/document/docfile/Wireless_Security.pdf, 台灣電腦網路危機處理暨協調中心, 2003年2月
[洪榮欣 03] 洪榮欣, "Mobile IP 技術發展", access from http://www.ccl.itri.org.tw/ about/ccl_enews/CCL_e9106133K.htm at 2003年4月
[秦新發 02] 秦新發, 虛擬私人網路VPN之建置研究, 中央大學資訊管理研究所碩士論文, 2001年2月
[張家瑜 01] 張家瑜, 曾柏堯, "探索VPN", 網路通訊雜誌122期, 2001年9月
[陳俊利 02] 陳俊利,無線區域網路架構中有線等效保密演算法安全性分析, 中興大學電機工程研究所碩士論文, 2002年7月
[陳彥銘 02] 陳彥銘, "無線網路攻略大全一:安全問題解析", access from http://www.secucom.com.tw/service/download/column/020701.pdf at 2002年8月
[游源松 02] 游源松, 溫演福, 企業資料通訊與網路, 滄海書局, 2002年9月
[微軟00] 微軟, "Windows 2000群組原則", Access from http://www.microsoft.com/ taiwan, at 2002年5月
[微軟03] 微軟, "Windows 2000 Server and Advance Server" accsee from http://www.microsoft.com/taiwan at 2002年2月
[葉筱楓 01] 葉筱楓, "IP-VPN技術及應用發展之探討", 電信研究雙月刊 第31卷第二期, 2001年4月
[談應衡 01] 談應衡, 企業網路功能需求分析之研究, 實踐大學企業管理研究所碩士論文, 2001年2月
[鄭懿讚 00] 鄭懿讚,無線網路傳訊生活無線可及,第四章無線網路的應用,學貫行銷股份有限公司, 2002年5月
英文部份
[Arba 01] W. A. Arbaugh, N. Shankar, Y.C. J. Wan, "Your 802.11 Wireless Network has No Clothes", access from http://www.cs.umd.edu/~waa/wireless.pdf, University of Maryland ,March 30, 2001
[Barn 02] C. Barnes, T. Bautts, D. Lloyd etc., Hack Proofing Your Wireless Network, Syngress Publishing inc., 2002
[Blue 03] Bluesocket , "Bluesocket Product Line", access from http://www.bluesocket.com/solutions/6PagesBrochure.pdf, Apr 2003
[Cisc 01] Cisco inc., "Wireless LAN Benefits Study", Oct 2001, access from http://newsroom. cisco.com/dlls/tln/pdf/WLAN_study.pdf at May 2003
[Cisc 03a] Cisco inc. "Cisco Aironet 350 Series Access Points Data sheet", access from http://www.cisco.com/warp/public/cc/pd/witc/ao350ap/prodlit/ carto_in.pdf at Apr 2003
[Cisc 03b] Cisco inc., "Cisco AVVID Network Infrastructure Enterprise Wirless LAN Design", access from http://www.cisco.com/application/pdf/en/us/guest/ netsol/ns178/c649/ccmigration_09186a00800d67eb.pdf at Apr 2003
[Cisc 03c] Cisco inc., "Configuring the Cisco Wireless Security Suite", access from http://www.cisco.com/warp/public/cc/pd/witc/ao1200ap/prodlit/wrsec_an.pdf at Apr 2003
[Erwi 02] H. E. Erwin, GSEC Practical, "The IEEE 802.1x Port-Based Network Access Control and Its Implementation" access from http://www.giac.org/practical/GSEC/Herny_Elisa_Erwin_GSEC.pdf, Oct 2002
[Fluh 03] S. Fluhrer, I. Mantin, A. Shamir, "Weaknesses in the Key Scheduling Algorithm of RC4", access from http://downloads.weblogger.com/gems/ 80211b/rc4weakness.pdf at Jan 2003
[Hala 02] Dave Halasz, "IEEE 802.11i draft & Call For IEEE 802.11i draft & Call ForInterest on Link Security for IEEE 802 Networks", access from http://grouper.ieee.org/groups/802/linksec/meetings/MeetingsMaterial/Nov02/halasz_sec_1_1102.pdf, IEEE 802 Security CFI Plenary, Dec 2002
[He 97] Jingsha He "Performance and Manageability Design in an Enterprise Network Security System", In Proceeding of the 1997 IEEE Enterprise Networking Mini-Conference, pp.127 –134,Jun 1997
[Hole 03] Kjell.Hole "Indoor WLAN Design Part V: 802.11 Security" access from http://www.kjhole.com/Bluetooth/PDF/WLAN5.pdf at Apr 2003.
[IEEE 01] IEEE, "IEEE Standard for Local and metropolitan area networks-Port- Based Network Access Control", access from http://www.vayner.net/ Docs/802.1/802.1X-2001.pdf, IEEE Std 802.1X-2001, Oct 2001
[IEEE 99] IEEE, "Wireless LAN Medium Access Control (MAC) and Physical Layer(PHY) Specifications", access from http://ftp.cse.sc.edu/jdavis/ IEEE-802.11-Docs/802.11-1999.pdf, IEEE Std 802.11, 1999
[Mama 99] L. Mamakos, K. Lidl, J. Evarts "A Method for Transmitting PPP Over Ethernet (PPPoE) ", RFC 2516, Feb 1999.
[Micr 03] Microsoft, "Active Directory Architecture" access from http://www.Microsoft.com/ technet at Mar 2003
[Mish 02] A. Mishra, W. A. Arbaugh, "An Initial Security Analysis of the IEEE 802.1X Standard", access from http://www.csc.gatech.edu/~gte369k/ 802_1x.pdf, University of Maryland, Feb 2002
[Nets 03] Netscape, "Introduction to SSL", Access from http://developer.netscape. com/ at Apr 2003
[NIST 02] T. Karygiannis, L. Owens, "Wireless Network Security : 802.11,Bluetooth and Handheld Devices", access from http://csrc.nist.gov/publications/ nistpubs/800-48/NIST_SP_800-48.pdf, NIST Special Publication 800-48, November 2002
[Pras 00] A.R.Prasad、H. M.d,J. Kruys "Security Architecture for Wireless for Wireless LANs: Corporate & Public Environment", In Proceeding of the 51th IEEE Vehicular Technology Conference at Tokyo spring 2000, vol.1, pp. 283 -287,2000
[Schn 03] Dr.Schneider, "LAN Switching Technologies and Virtual LAN" access from http://www.isse.gmu.edu/~eschneid/infs612/projects/LAN.pdf at May 2003.
[Veri 01] Vernier inc.,"Controlling the Network Edge Vernier Networks and the Enterprise", Vernier Networks White Papers, Sep 2001.
[Wang 02] J.H. Wang, T. L. Lee, "Enhanced intranet management in a DHCP-enabled environment", In Proceeding of the 26th IEEE annual international Computer Software and Applications Conference , pp. 893 –898,2002
[Welt 98] Alan von Weltin , "Technical Guide to Secure Channels and the NT Client Authentication Process", Microsoft TechNet Volume 6 Issue 12, Microsoft, Dec 1998 |