Index I


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

I Love You worm
       estimated damages  
i-mode
       (cHTML)   2nd  
       Japanese PCS devices   2nd  
IBM Wireless Security Auditor
       application window  
       configuration screen  
       features   2nd  
       GPS support  
       Help menu  
       launching  
       root background window  
       supported WNICs  
IDS
       (intrusion detection systems)  
       diagnostic software
               sensitivity versus specificity   2nd  
       future  
               embedded IDS   2nd  
               geometric data display  
               host versus network-based IDS  
               strict anomaly detection  
               strict anomaly detection;   [See fluctuations]2nd   [See fluctuations]
       hacking strategies
               fragmentation  
               HTTP mutation   2nd  
               spoofing TCP sequence number  
       host-based  
       integrity monitors
               Tripwire   2nd  
       limitations
               switched network sensoring  
               update maintenance  
               vulnerability to attack  
       log file monitors  
               Swatch   2nd  
       network-based  
       predictive value
               Bayes theorem  
               function of  
       predictive values
                likelihood ratios (LRs)   2nd   3rd  
       problems and solutions  
       ROC curves
               accuracy measurements  
       sensitivity
               accuracy results   2nd  
               mathematical formula   2nd  
       signature scanners
               anomaly detectors  
               Snort   2nd  
       specificity
               accuracy results   2nd  
               mathematical formula  
       stateful  
       Whister tool (Anti-IDS)  
IDSs
       WLAN implementation   2nd  
IEEE
       (Institute of Electrical and Electronics Engineers)  
       802 group
               certification subsets  
               function of  
       802.11 standard  
               CSMA/Collision Avoidance   2nd  
               overview   2nd  
               prior technoligies  
       802.11a standard
               5GHz range  
               Orthogonal Frequency Division Multiplexing  
               overview  
               versus 802.11b standard   2nd  
       802.11b standard
               2.4 GHz range   2nd  
               DSSS (direct-sequence spread spectrum)  
               versus 802.11a standard   2nd  
       802.11g standard
               overview  
       802.3 standard
               CSMA/CD   2nd  
IEEE 802.11 standard
       administrative issues  
       future enhancements
               AES (Advanced Encryption Standard)   2nd  
               TKIP (Temporal Key Integrity Protocol)   2nd   3rd   4th  
       security issues
               flaws   2nd  
       security protocols
               Shared Key authentication   2nd  
               WEP encryption   2nd  
       WEP
               128-bit  
               development of   2nd  
               flaws   2nd  
               original intent of  
               RC4 algorithm  
Info panel (Kismet)   2nd   3rd   4th  
information utility (NetForce)  
information utility (vxUtil)  
Initialization Vector (IV)
       RC4 encryption   2nd  
       WEP flaws   2nd  
installing
       AiroPeek NX   2nd   3rd  
       AirSnort   2nd  
       CENiffer
               Compaq iPAQ  
       Ethereal for Linux   2nd   3rd  
               RPMs   2nd  
               troubleshooting errors   2nd  
       Ethereal for Windows   2nd  
       Kismet   2nd   3rd  
               options   2nd  
       MiniStumbler
               Compaq iPAQ  
       Net Force
               Compaq iPAQ   2nd   3rd   4th  
       NetStumbler   2nd   3rd  
       Pocket PC programs   2nd  
       Pocket PC WLAN drivers   2nd  
       Swatch log file monitor   2nd  
       vxUtil
               Compaq iPAQ   2nd   3rd   4th  
       WEPCrack  
       WinPcap utility
               Ethereal for Windows  
       WNICs
               Windows XP   2nd  
instant mesaging
       hacker technique   2nd  
integrity monitors (IDS)
       Tripwire   2nd  
Internet Explorer
       security settings  
Internet Information Server (IIS)
       configuring for WML applications  
intrusion detection systems (IDSs)
       WLAN implementation   2nd  
intrusion detection systems,   [See IDS]
IP addresses
       masks (VPNs)  
ipconfig tool
       MAC addresses
               displaying (Windows NT/2000/XP/.NET)  
ipconfig-a tool
       MAC addresses
               displaying (Linux)  
IPSec
       (Internet Protocol Security)  
       3DES (Triple DES)  
       DES (Data Encryption Standard)  
       embedded IDS   2nd  
       encryption  
       machine-level authentication  
       RFCs 2401-2409  
       transport mode  
       tunnel mode  
IPX packets
       transporting (VPNs)  
IrDA protocol
       (Infrared Data Association)   2nd   3rd   4th   5th  
       overview   2nd   3rd  
       PANs (personal area networks)  
       potential light transmission problems  
ISM (Industrial, Science, and Medical) frequencies  
isotropic Antennas  
IV (Initalization Vector)
       WEP  
               collisions   2nd   3rd   4th  
IV (Initialization Vector)
       WEP
               weak formats   2nd  



Maximum Wireless Security
Maximum Wireless Security
ISBN: 0672324881
EAN: 2147483647
Year: 2002
Pages: 171

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net