Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] WAN systems war chalking war driving war flying war walking Ware, Willis H. warm sites water damage Web attacks Web services, advanced Wertheimer, Nancy Wi-Fi Protected Access (WPA) 2nd wide area networks Wired Equivalent Privacy (WEP) 2nd wireless wireless cards wireless costs wireless local area networks wireless network security access points (APs) ad hoc infrastructure AES protocol background basic service set (BSS) bridge channels cloak decibel (dB) electrical fields director dish antenna parabolic reflector reflector Yagi electrostatic vector how wireless works independent service set (ISS) infrastructure infrastructure architecture LEAP protocol monitoring wireless networks multipath signals physical layer wireless attacks advanced eavesdropping attacks eavesdropping eavesdropping defenses forced degradation attacks hardening access points PoE rogue access points sophisticated attacks roaming stealth Temporal Key Integrity Protocol (TKIP) why it matters Wi-Fi Protected Access (WPA) Wired Equivalent Privacy (WEP) wireless cards wiretaps WLANs worms 2nd |