Index_E


E

ego, hackers/crackers and, 52

electromagnetic waves, antennas and, 139

e-mail, social engineering and, 56

EMF (electromagnetic field), detection, 136

employees, crackers and, 55

encapsulation, 33–34

encryption

cipher, 168

cipher frequency analysis, 172

ciphertext, 170

cordless phones, 164

cryptography, 168

decryption, 168

history of, 171–172

hotspot protection and, 65

hybrid systems of cryptography, 175–176

introduction, 167

modern techniques, 173–179

NetStumbler, 96

passwords and, 169

patterns, 172

PGP (Pretty Good Privacy), 184

plaintext, 168–169

public key cryptography, 174–175

scytale, 171

security and, 10, 205–206

steganography, 171

transposition cipher, 171

VPNs and, 173

wardriving protection and, 95–96

WEP and, 96, 179–181, 205–206

WPA and, 96, 182

encryption key

ciphertext, 170

description, 170

entropy and, 178–179

history, 172–173

key length, 178–179

pseudo-random key, 180

WEP and, 181

entropy, encryption key length and, 178–179

equipment

access points, 11

adapters, 13–14

to avoid, 14

cost comparison, 7

optimization, 145–146

standards, 14–15

upgradeable, 15

errors in configuration, identification, 132–133

ESD (electrostatic discharge), hardware failure and, 218

Ethernet networks

coaxial cabling and, 5

definition, 250

equipment cost, 7

hybrid with wireless, 5

security, 8

speed compared to Wi-Fi, 6, 8

wireless comparison, 5–8

EXE file extensions, viruses and, 106




Caution. Wireless Networking. Preventing a Data Disaster
Caution! Wireless Networking: Preventing a Data Disaster
ISBN: 076457213X
EAN: 2147483647
Year: 2003
Pages: 145

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net