Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

Wireless Local Area Network Security : An Investigation Into Security Tool Usage In Wireless Networks, Susan Webb Jan 2003

Wireless Local Area Network Security : An Investigation Into Security Tool Usage In Wireless Networks, Susan Webb

Theses : Honours

Many organisations and individuals installing wireless local area networks (WLANs), which are based on the IEEE 802.11 b standard, have little understanding of the security issues that surround this technology.

This study was initiated to determine how WLAN security issues affect organisations in Perth, Western Australia. The scope of the study was restricted to 802.llb WLANs operating in infrastructure mode, where all traffic is transmitted by wireless access points (APs). This study was conducted in two phases. The general aims of the first phase were to determine the number of detectable WLANs in the Perth Central Business District (CBD) and …


The Mediated Data Integration (Medint) : An Approach To The Integration Of Database And Legacy Systems, Suvimol Mukviboonchai Jan 2003

The Mediated Data Integration (Medint) : An Approach To The Integration Of Database And Legacy Systems, Suvimol Mukviboonchai

Theses: Doctorates and Masters

The information required for decision making by executives in organizations is normally scattered across disparate data sources including databases and legacy systems. To gain a competitive advantage, it is extremely important for executives to be able to obtain one unique view of information in an accurate and timely manner. To do this, it is necessary to interoperate multiple data sources, which differ structurally and semantically. Particular problems occur when applying traditional integration approaches, for example, the global schema needs to be recreated when the component schema has been modified. This research investigates the following heterogeneities between heterogeneous data sources: Data …