Flylib.com
Index_T
Previous page
Table of content
Next page
T
Target profiling, 191 “92
TCP Wrappers, 60 “62
availability, 60
client/server relationship and, 61
defined, 60
functioning of, 61
problems with, 61 “62
software bugs , 62
See also
Host-based intrusion detection
Temporal Key Integrity Protocol.
See
TKIP
Theft, 4 “5
computer hardware/software, 5
identity, 277
motive, 4
Thin clients , 280
Threats
identifying, 168
likelihood , determining, 161
to personal privacy, 4
WLAN, analysis, 312
TKIP, 125, 225
defined, 223
using, 226 “27
WEP weaknesses and, 225 “26
WPA, 303 “4
Total Cost of Ownership (TCO), 280, 312
Training, 170 “71
Transport Layer Security (TLS), 182, 221
Triple DES, 154 “55
defined, 154 “55
key length, 155
See also
Encryption schemes
Tripwire, 64 “65
attribute verification, 65
defined, 64
protection, 65
purpose, 64
See also
Host-based intrusion detection
Trojan horses, 219
Tunneling, 241
Previous page
Table of content
Next page
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153
Authors:
John Rittinghouse PhD CISM
,
James F. Ransome PhD CISM CISSP
BUY ON AMAZON
Software Configuration Management
A Practical Approach to Documentation and Configuration Status Accounting
CM Automation
Appendix E Test Plan
Appendix I System Service Request
Appendix T Software Configuration Management Plan (SCMP)
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
Asynchronous Ports (TTYs)
Frame Relay
QoS Device Manager
Multilink PPP
Switches and VLANs
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Understanding Intrusion Detection
Crash Course in the Internet Protocol Suite
Unauthorized Activity I
Unauthorized Activity II
Cisco Secure IDS
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 37. Get Real-Time Network Stats
Hack 38. Graph Your Wireless Performance
Hack 41. Visualize a Network
Hacks 6382: Introduction
Hack 80. Redirect Brought to you by Bonjour Ads
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
Success Story #1 Lockheed Martin Creating a New Legacy
Success Story #2 Bank One Bigger… Now Better
Success Story #3 Fort Wayne, Indiana From 0 to 60 in nothing flat
Service Process Challenges
Using DMAIC to Improve Service Processes
Extending and Embedding PHP
Anatomy of an Extension
Summary
Returning Values by Reference
Diverting the Stream
Array Manipulation
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies