ego, hackers/crackers and, 52
electromagnetic waves, antennas and, 139
e-mail, social engineering and, 56
EMF (electromagnetic field), detection, 136
employees, crackers and, 55
encapsulation, 33–34
encryption
cipher, 168
cipher frequency analysis, 172
ciphertext, 170
cordless phones, 164
cryptography, 168
decryption, 168
history of, 171–172
hotspot protection and, 65
hybrid systems of cryptography, 175–176
introduction, 167
modern techniques, 173–179
NetStumbler, 96
passwords and, 169
patterns, 172
PGP (Pretty Good Privacy), 184
plaintext, 168–169
public key cryptography, 174–175
scytale, 171
security and, 10, 205–206
steganography, 171
transposition cipher, 171
VPNs and, 173
wardriving protection and, 95–96
WEP and, 96, 179–181, 205–206
WPA and, 96, 182
encryption key
ciphertext, 170
description, 170
entropy and, 178–179
history, 172–173
key length, 178–179
pseudo-random key, 180
WEP and, 181
entropy, encryption key length and, 178–179
equipment
access points, 11
adapters, 13–14
to avoid, 14
cost comparison, 7
optimization, 145–146
standards, 14–15
upgradeable, 15
errors in configuration, identification, 132–133
ESD (electrostatic discharge), hardware failure and, 218
Ethernet networks
coaxial cabling and, 5
definition, 250
equipment cost, 7
hybrid with wireless, 5
security, 8
speed compared to Wi-Fi, 6, 8
wireless comparison, 5–8
EXE file extensions, viruses and, 106