[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] data integrity verifying (CRCs) 2nd databases hacking via dynamic Web pages 2nd 3rd decimal data hexadecimal/binary conversion table decryption asymmetrical public/private keys 2nd symmetrical 2nd decryption process RC4 algorithm WEP security deducing keystreams from ciphertext (WEP) 2nd 3rd denial-of-service (DoS) attacks DNS spoofing 2nd 3rd frequency jamming 2nd 3rd 4th 5th smurf type 2nd 3rd spoofing technique 2nd 3rd 4th SYN flooding slave computers 2nd 3rd system overloads 2nd deploying VPNs in WLANs 2nd DES versus AES (Advanced Encryption Standard) DES (Data Encryption Standard) IPSec detecting sniffers AntiSniff software WLANs Windows XP tools 2nd 3rd 4th diagnostic software (IDS) sensitivity mathematical formulaic representation 2nd sensitivity versus specificity 2nd specificity mathematical formulaic representation Diffie-Hellman algorithm (PKI) Digital Enhanced Cordless Telecommunications (DECT) digital signatures nonrepudiation one-way hash algorithm 2nd wireless PKI Entrust.com example Direct Sequence Spread Spectrum (DSSS) channel assignments/overlap guide) 2nd directional Antennas 2nd HyperLink HG2415Y 2nd technical specifications 2nd HyperLink HG2419G 2nd 3rd 4th Signull SMISMCY12 2nd technical specifications TechnoLab Log Periodic Yagi 2nd technical specifications DMZ (demilitarized zone) access point-based security 2nd DNS Lookup utility (NetForce) DNS Lookup utility (vxUtil) DNS spoofing attacks 2nd 3rd downloading hostile Web pages potential damage 2nd Swatch log file monitor 2nd drivers AiroPeek NX installing 2nd DSA algorithm (PKI) DSSS (direct-sequence spread spectrum) dual-slot devices removable WIM chip WAP security tokens dumpster diving hacker technique 2nd dynamic Web pages vulnerability to attack 2nd 3rd |