Flylib.com
Index_V
Previous page
Table of content
Next page
V
Vendor-assisted hacking, 90
Verification, 149 “50
Violations Reporting Policy, 164
Virtual Ethernet Interface (VEI), 261
Virtual Local Area Networks (VLANs), 187 “88
configuration, 189 “90
support, 187
Virtual Private Networks (VPNs), 240 “60
advantages, 240, 241
concentrators , 262
connections, 242, 245
disadvantages, 242
industry acceptance, 242
IPSec/IKE, 249 “53
L2TP/IPSec, 247 “49
Layer 3, 243
linking, 240
Mobile IP and, 258 “60
over wireless medium, 241
port forwarding and, 255
PPTP, 246 “47
public key authentication and, 256 “58
RADIUS and, 292
redirection, 245
secure shells and, 254 “55
servers, 244
SFTP and, 253, 256
solution considerations, 243 “44
SSH2, 253
tunneling, 241
types, 244 “53
value, 272
in WLANs, 244
Virtual Router Redundancy Protocol (VRRP), 268
Virus incidents, 217
Voice communications, authority to intercept, 102
Voice-mail communications, 102 “3
Voice over IP (VoIP), 303
Previous page
Table of content
Next page
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153
Authors:
John Rittinghouse PhD CISM
,
James F. Ransome PhD CISM CISSP
BUY ON AMAZON
Network Security Architectures
Good Network Security Is Predictable
Routing Considerations
IP Telephony
Secure Network Management and Network Security Management
Conclusions
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Wide Area Network (WAN) Technologies
User Datagram Protocol
Domain Name System (DNS)
Windows Internet Name Service (WINS)
Virtual Private Networks (VPNs)
Data Structures and Algorithms in Java
Vocabulary
Projects
Representation
C.2. Sum of Constants
D.1. Data Structures and Algorithms
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Correlation
Notification and eventing
Service layer abstraction
Part IV: Building SOA (Planning and Analysis)
A.3. The Oasis Car Wash
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Computers as Persuasive Social Actors
The Ethics of Persuasive Technology
User Interfaces in C#: Windows Forms and Custom Controls
Creating Usable Interfaces
Control Class Basics
Modern Controls
Dynamic User Interface
Help and Application-Embedded Support
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies