Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 2: Managing Access
Figure 2.1: Examples of Access Control Lists (ACLs).
Chapter 7: Wireless Networking Basics
Figure 7.1: How 802.11 works in the OSI Model.
Figure 7.2: A certificate chain.
Figure 7.3: A solo certificate.
Figure 7.4: A long certificate chain.
Figure 7.5: Certificate validation process.
Figure 7.6: Public key encryption and decryption as used in a PKI.
Figure 7.7: Certificate authority process hierarchy.
Figure 7.8: The digital signature process.
Figure 7.9: A mobile transaction involving multiple intermediaries.
Figure 7.10: Sign-on process involving an authentication server.
Figure 7.11: Federation of single sign-on domains.
Chapter 10: WLAN Risk and Threat Mitigation
Figure 10.1: The OSI model and an example of functional layering for WLANs.
Figure 10.2: Segmentation of wired and wireless network segments.
Chapter 12: WISDOM for WLAN Practitioners
Figure 12.1: WISDOM Basic Security topology.
Figure 12.2: WISDOM Intermediate Security topology.
Figure 12.3: WISDOM Advanced Security topology.
Previous page
Table of content
Next page
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153
Authors:
John Rittinghouse PhD CISM
,
James F. Ransome PhD CISM CISSP
BUY ON AMAZON
Snort Cookbook
Invisibly Tapping a Hub
Positioning Your IDS Sensors
Logging Only Alerts
Newbies Playing with Snort Using EagleX
Tools for Testing Signatures
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Team change
Part II - The Applications
Mergers and acquisitions
Cultural change
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter One Solutions
Chapter Two Principles
Chapter Three Sales Process
Chapter Four Precall Planning and Research
Chapter Seven Diagnose Before You Prescribe
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 14. Control Your Bluetooth Phone with FMA
Hacks 4051: Introduction
Hacks 6382: Introduction
Hack 78. Advertise Bonjour Services in Linux
Hack 83. Make a Deep Dish Cylindrical Parabolic Reflector
GDI+ Programming with C#
The Graphics Class
The GDI+Painter Application
A Simple Text Editor
Drawing Transparent Graphics Objects
Transformation Types
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Strings and Regular Expressions
Files and Directories
Windows Programming
Windows Controls
Remoting and Enterprise Services
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies