MLA
Curran, Kevin, and Elaine Smyth. "Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks." Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, IGI Global, 2008, pp. 1426-1449. https://doi.org/10.4018/978-1-59904-937-3.ch096
APA
Curran, K. & Smyth, E. (2008). Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks. In H. Nemati (Ed.), Information Security and Ethics: Concepts, Methodologies, Tools, and Applications (pp. 1426-1449). IGI Global. https://doi.org/10.4018/978-1-59904-937-3.ch096
Chicago
Curran, Kevin, and Elaine Smyth. "Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks." In Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, 1426-1449. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-937-3.ch096
Export Reference