@incollection{, A4164DBF0F0430E0655D96414BBF3082 , author={{Dr.Yasser Elmalik AhmedSeleman} and {Kingdom of Saudi Arabia, Ministry of Education, Bisha University}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}16214 } @incollection{b0, , title={{The X factor: 802.1 xs may be just what you need to stop intruders From accessing your network}} , author={{ DKelley }} , journal={{Information Security}} 6 8 , year={2003} } @incollection{b1, , title={{Best practices for wireless network security}} , author={{ SKennedy }} , journal={{Information Systems Control Journal}} 3 , year={2004} } @book{b2, , title={{Laptop theft puts GMAC customers' data at risk. Information Week Security Pipeline}} , author={{ PMcdougall }} , year={2004. March 25} } @book{b3, , title={{Man-in-the-middle attacks in tunneled authentication protocols}} , author={{ Nokia }} , year={2003} } @book{b4, , title={{Hacking Wireless Networks for Dummies Retrieved}} , author={{ KevinBeaver } and { PeterTDavis } and { DevinKAkin }} , year={2009-02-09} } @book{b5, , title={{References Références Referencias}} }