Index_T


T

TCP/IP model

Application layer, 30

Data link (MAC) layer, 30

Network layer, 30

OSI model comparison, 29–30

Transport layer, 30

TCP/IP port scanners, home network attacks, 78

TCP/IP protocols

definition, 254

descriptions, 32

encapsulation, 33–34

packet switching, 33–34

Telnet, 214

theft of service identification, 131–132

threats to privacy, location-based services, 149–151

throughput, 8

time outs, session hijacking and, 59

TLD (top-level domain), 40

ToorCon hacker/cracker convention, 54

topologies, 5, 24

traffic filtering, network security and, 197–202

transceivers

antennas and, 139

definition, 254

Transport layer

OSI reference model, 29

TCP/IP model, 29, 30

transposition cipher

encryption and, 171

ROT13 encryption, 172

trashing, crackers and, 56

trees, interference, 144–145

Trojans

backdoors and, 111

description, 110

hoaxes and, 121

introduction, 101

troubleshooting

adjacent channel overlap, 130

configuration errors, 132–133

equipment optimization, 145–146

interference detection, 134–137

interoperability issues, 138

multipath interference, 125–130

theft of service identification, 131–132




Caution. Wireless Networking. Preventing a Data Disaster
Caution! Wireless Networking: Preventing a Data Disaster
ISBN: 076457213X
EAN: 2147483647
Year: 2003
Pages: 145

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net