Flylib.com
Part V: Appendixes
Previous page
Table of content
Next page
IN THIS PART
A
Hex to Decimal Conversion Table
B
WEPCrack Exploit Code Example
C
References
Previous page
Table of content
Next page
Maximum Wireless Security
ISBN: 0672324881
EAN: 2147483647
Year: 2002
Pages: 171
Authors:
Cyrus Peikari
,
Seth Fogie
BUY ON AMAZON
Strategies for Information Technology Governance
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
Managing IT Functions
Governing Information Technology Through COBIT
Governance in IT Outsourcing Partnerships
Governance Structures for IT in the Health Care Industry
The CISSP and CAP Prep Guide: Platinum Edition
Cryptography
Initiation of the System Authorization Process
Continuous Monitoring Process
Appendix A Answers to Assessment Questions
Appendix G Control Baselines
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Internet Protocol (IP) Basics
Internet Group Management Protocol (IGMP)
Transmission Control Protocol (TCP) Data Flow
Dynamic Host Configuration Protocol (DHCP) Server Service
Domain Name System (DNS)
The Complete Cisco VPN Configuration Guide
Cisco WebVPN Solution
Cisco VPN Software Client
Summary
Summary
ISAKMP/IKE Phase 2 Connections
Postfix: The Definitive Guide
How Messages Enter the Postfix System
Email Routing
Common Problems
Local Delivery and POP/IMAP
Configuring Postfix for SASL
MySQL Cookbook
Performing Calculations with TIMESTAMP Values
The Effect of ALTER TABLE on Null and Default Value Attributes
Determining the Current MySQL User
Importing CSV Files
Using MySQL-Based Sessions in Perl Applications
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies