WAN (wide area network), 73, 74, 86–91, BC29
war, 342
war dialing, 268, BC29
war driving, 268, BC30
warm site, 290, BC30
wastefulness, 255
water damage, 341
weather damage, 341
Web security, 115
Web site resources
ASIS International, 375
Carnegie Mellon SEI CERT Coordination Center, BC32
Check Point Certified Professional Program, 376
Cisco, 376
CISSP Open Study Guide, 14, 367, BC31
CompTIA, 377
CVE (Common Vulnerabilities and Exposures), BC32
Disaster Recovery Institute International (DRII), 378
GIAC (Global Information Assurance Certification), 381
HierosGamos Guide to Computers and the Law, BC32
INFOSYSSEC, BC32
International Council of E-Commerce Consultants, 379
Internet Security Systems, BC33
ISACA (Information Systems Audit and Control Association), 379–380
(ISC)2, 11, 380
(ISC)2 Code of Ethics, 333
(ISC)2 journal, 29
(ISC)2 newsletter, 29
Microsoft certifications, 381
OWASP (Open Web Applications Security Project), 167
SANS (Systems Administration, Networking, and Security), 15, 381
security organizations, 31
Simovits Consulting, BC33
Slashdot, BC33
study guides, 13–14
WindowsSecurity Network Security Library, BC34
well-formed transaction, 235
WEP (Wired Equivalent Privacy), 86, BC30
white box testing, 68, BC30
white hats, 183
wide area network (WAN), 73–74, BC29
WiFi, BC30
WiFi protected access (WPA), 86
WindowsSecurity Network Security Library, BC34
Wired Equivalent Privacy (WEP), 86, BC30
wireless LAN (WLAN), 74
Wireless Transport Layer Security (WTLS), 216–217, BC30
work experience required, 10–11
work factor, 197, BC30
World Trade Center attacks, disaster recovery planning changed by, 279
worm, 174–175, BC30
Writ of Possession, 328