Flylib.com
Index_M
Previous page
Table of content
Next page
M
MAC
ACL functionality, 179
address spoofing/circumventing filters, 201 “2
Macro viruses, 217 “18
Malicious code attacks, 71 “72, 217 “20
macro viruses, 217 “18
spyware, 219 “20
Trojan horses, 219
virus incidents, 217
worms, 218 “19
See also
Attacks
Malicious coders, 9
Malicious hackers, 8
Mandatory access control model, 26 “27
MIDP 2.0, 148
MiniStumbler, 196
Misuse, 72
Mobile IP, 258 “60
clients , 258
firewalls and, 259
IP datagrams and, 259
specification, 258
Mobile security, 129 “50
authentication, 137 “38
certificates, 129 “37
code signing, 149
content-based, 138 “39
cryptography toolkits, 141 “47
data, 147 “48
device, 140
device-specific APIs, 147
distributed access control, 140
ubiquity, 137
verification, 149 “50
Multifactor authentication, 301 “2
Multipurpose Internet Mail Extensions (MIME), 102 “3
Previous page
Table of content
Next page
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153
Authors:
John Rittinghouse PhD CISM
,
James F. Ransome PhD CISM CISSP
BUY ON AMAZON
Introducing Microsoft Office InfoPath 2003 (Bpg-Other)
Creating Forms
Laying Out Forms
Working with Advanced Form Elements
Connecting Forms to Databases
Writing Advanced Event Handlers
The CISSP and CAP Prep Guide: Platinum Edition
Information Security and Risk Management
Operations Security
Initiation of the System Authorization Process
The Accreditation Phase
Appendix G Control Baselines
MySQL Clustering
Installation
Common Errors While Importing Tables
The Structure of config.ini
MySQL Clusters Native Backup Tool
Displaying the Status of the Cluster/Controlling Nodes
C & Data Structures (Charles River Media Computer Engineering)
The scanf Function
Function
Files
Problems in Trees
Problems in Graphs
Programming Microsoft ASP.NET 3.5
Working with the Page
ASP.NET State Management
ASP.NET Security
Extending Existing ASP.NET Controls
Index
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 8. Remote Control Mac OS X with Bluetooth Phones and PDAs
Hack 23. Find All Available Wireless Networks
Hack 42. Secure Your Linux Network with WPA
Hack 72. Run Your Mac as an Access Point
Section A.12. BSS Versus IBSS
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies