Index D


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

data
       integrity
               verifying (CRCs)   2nd  
databases
       hacking via dynamic Web pages   2nd   3rd  
decimal data
       hexadecimal/binary conversion table  
decryption  
        asymmetrical
               public/private keys   2nd  
       symmetrical   2nd  
decryption process
       RC4 algorithm
               WEP security  
deducing
       keystreams from ciphertext (WEP)   2nd   3rd  
denial-of-service (DoS) attacks  
       DNS spoofing   2nd   3rd  
       frequency jamming   2nd   3rd   4th   5th  
        smurf type   2nd   3rd  
       spoofing technique   2nd   3rd   4th  
       SYN flooding
               slave computers   2nd   3rd  
       system overloads   2nd  
deploying
       VPNs
               in WLANs   2nd  
DES
       versus AES (Advanced Encryption Standard)  
DES (Data Encryption Standard)
       IPSec  
detecting
       sniffers
               AntiSniff software  
       WLANs
               Windows XP tools   2nd   3rd   4th  
diagnostic software (IDS)
       sensitivity
               mathematical formulaic representation   2nd  
       sensitivity versus specificity   2nd  
       specificity
               mathematical formulaic representation  
Diffie-Hellman algorithm (PKI)  
Digital Enhanced Cordless Telecommunications (DECT)  
digital signatures  
       nonrepudiation  
       one-way hash algorithm   2nd  
       wireless PKI
               Entrust.com example  
Direct Sequence Spread Spectrum (DSSS)
       channel assignments/overlap guide)   2nd  
directional Antennas   2nd  
       HyperLink HG2415Y   2nd  
               technical specifications   2nd  
       HyperLink HG2419G   2nd   3rd   4th  
       Signull SMISMCY12   2nd  
               technical specifications  
       TechnoLab Log Periodic Yagi   2nd  
               technical specifications  
DMZ (demilitarized zone)
       access point-based security   2nd  
DNS Lookup utility (NetForce)  
DNS Lookup utility (vxUtil)  
DNS spoofing attacks   2nd   3rd  
downloading
        hostile Web pages
               potential damage   2nd  
       Swatch log file monitor   2nd  
drivers
       AiroPeek NX
               installing   2nd  
DSA algorithm (PKI)  
DSSS
       (direct-sequence spread spectrum)  
dual-slot devices
       removable WIM chip
               WAP security tokens  
dumpster diving
       hacker technique   2nd  
dynamic Web pages
       vulnerability to attack   2nd   3rd  



Maximum Wireless Security
Maximum Wireless Security
ISBN: 0672324881
EAN: 2147483647
Year: 2002
Pages: 171

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net