P1: IML/FFX P2: IML/FFX QC: IML/FFX T1: IML
WL040C-21 WL040/Bidgolio-Vol I WL040-Sample.cls August 13, 2003 17:16 Char Count= 0
FURTHERREADING 273Boncella, R. J. (2002). Wireless Security: An Overview.
Communications of the AIS, 9, Article 15. Retrieved
March 5, 2003, from http://cais.isworld.org/
Forouzan, B. A. (2000).TCP/IP protocol suite.Boston, MA:
McGraw–Hill.
Garfinkel, S., and Spafford, G. (2001).Web security, pri-
vacy & commerce(2nd ed.). Cambridge, MA: O’Reilly
and Associates.
Netscape Communications (1996).SSL 3.0 Specification.
Retrieved October 1, 2002, from http://wp.netscape.
com/eng/ssl3/ssl-toc.html
Netscape Communications (1998). Introduction to
SSL. Retrieved October 1, 2002, from http://developer.
netscape.com/docs/manuals/security/sslin/contents.htm
Rescorla, Eric (2001).SSL and TLS: Designing and build-
ing secure systems.Boston, MA. Addison–Wesley.
RFC 2246 (2002).The TLS protocol version 1.0.Retrieved
October 1, 2002 from http://www.ietf.org/rfc/rfc2246.txt
RFC 2401 (2002).Security architecture for the Internet
protocol.Retrieved October 1, 2002 from http://www.
ietf.org/rfc/rfc2401.txt
Stallings, William. (2000). Network security essentials:
Applications and standards.Upper Saddle River, NJ:
Prentice–Hall.
Stein, Lincoln, D. (1998).Web security: A step-by-step ref-
erence guide,Reading, MA: Addison–Wesley.WAP Forum (2002).Wireless application protocol WAP
2.0,WAP Forum Technical White Paper. Retrieved Oc-
tober 1, 2002, from http://www.wapforum.org/what/
WAPWhitePaper1.pdfFURTHER READING
Gast, M. (2002).802.11 Wireless networks: The definitive
guide.Cambridge, MA: O’Reilly and Associates.
Netscape Communications (1999). “How SSLWorks.”
Retrieved October 1, 2002 from http://developer.
netscape.com/tech/security/ssl/howitworks.html
Schneier, B. (1996).Applied cryptography(2nd ed.). New
York: Wiley.
Schneier, B. (2000).Secrets and lies: Digital security in a
networked world.New York, NY: Wiley.
Smith, R. E. (1997).Internet cryptography.Reading, MA:
Addison–Wesley.
Stallings, W. (1999).Cryptography and network security:
Principles and practice(2nd ed.). Upper Saddle River,
NJ: Prentice–Hall.
Thomas, S. (2001).SSL and TLS essentials. New York:
Wiley.
Viega, J., Messier, M. Chandra, and Pravir (2000).Network
security with OpenSSL. Cambridge, MA: O’Reilly and
Associates.