Index P


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

packet keys
       RC4 algorithm
               WEP security   2nd  
packet splitting
       IDS hacker attacks  
Palm OS
        airborne viruses
               infection methods   2nd  
               Liberty Crack   2nd  
               Phage  
               Vapor  
       Phage virus  
Palm PDAs   2nd  
Parabolic Grid Antennas
       HyperLink HG2419G   2nd  
               technical specifications   2nd  
pass-through authentication
       Funk Steel-Belted Server software (RADIUS)   2nd   3rd  
password generator utility (vxUtil)  
passwords
       dumpster diving   2nd  
       employee impersonations   2nd  
       lost
               encryption disadvantages  
       weaknesses  
PCS
       devices
               (Personal Communications Service)  
PCS devices
       .NET programming   2nd  
       browsing (WAP)   2nd   3rd  
       Japanese
               i-mode technology   2nd  
       Java 2 Micro Environment (J2ME)   2nd  
       minibrowsers  
       sample WML cards   2nd  
       WML
               application creation  
       WML applications
               creating  
               testing (Openwave SDK)  
       WMLScript
               client-side scripting   2nd   3rd  
PDAs
       Compaq iPAQ  
               features   2nd  
               technical specifications  
       Palm   2nd  
       PocketPC   2nd  
       programming languages   2nd  
               .NET   2nd  
               HTML  
               i-mode   2nd  
               Java   2nd  
               WML   2nd   3rd  
               WMLScript   2nd   3rd  
               XHTML   2nd   3rd   4th  
               XML   2nd   3rd  
       protocols
               WAP   2nd   3rd   4th   5th   6th   7th   8th   9th  
PEER mode (WNICs)
       probe request frames   2nd   3rd   4th  
Perl.com Web site  
Phage virus (Palm OS)   2nd  
piconet
       Bluetooth protocol  
PING
       hacking tool   2nd  
ping sweeper utility (vxUtil)  
ping utility (NetForce)  
ping utility (vxUtil)  
PKI
       (Public Key Infrastructure)  
       certificate authorities (CAs)  
               certificate chain  
               trust issues  
               trusted root certificate  
               X.509 standard   2nd   3rd   4th   5th   6th   7th  
       digital signatures  
               nonrepudiation  
               one-way hash algorithm   2nd  
       public key cryptography  
               public key algorithms   2nd   3rd   4th  
       WAP PKI Model
               CA Public Key Certificates (WTLS Class 2)   2nd   3rd  
               certificate delivery   2nd  
               certificate enrollment   2nd  
               certificate management   2nd   3rd  
               certificate requests   2nd  
               Client Public Key Certificates (WMLScript SignText)   2nd   3rd   4th  
               Client Public Key Certificates (WTLS Class 3)   2nd   3rd  
               device certificates   2nd  
               limitations   2nd  
               security tokens   2nd   3rd   4th   5th   6th   7th   8th  
               Service and Device Management (SDM)   2nd   3rd  
               SmartTrust software   2nd  
               SmartTrust Wireless Internet Browser (WIB)   2nd  
               Trusted Operator Services (TOS)   2nd   3rd   4th   5th   6th  
               WIM implementation methods   2nd  
       wireless implementation
               Entrust.com example   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  
plaintext
       predetrmining (WEP)   2nd  
Pocket PC
       CENiffer
               access point searches   2nd   3rd   4th   5th  
               data capturing  
               filters   2nd   3rd  
               installing  
               launching   2nd  
       hacking
               overview   2nd  
               Web site resources   2nd  
       IBM Wireless Security Auditor
               application window  
               configuration screen  
               features   2nd  
               GPS support  
               Help menu  
               launching  
               root background window  
               supported WNICs  
       MiniStumbler  
               access point searches   2nd  
               installing  
               launching   2nd  
       Net Force
               installing   2nd   3rd   4th  
               launching  
       programs
               installing   2nd  
       vxUtil
               installing   2nd   3rd   4th  
               launching  
       WLAN drivers
               installing   2nd  
PocketPC PDA   2nd  
port scanner utility (NetForce)  
port scanner utility (vxUtil)  
ports
       Trojan horses
               client/server side   2nd  
PPP (Point-to-Point Protocol)  
PPTP (Point-to-Point Tunneling Protocol)  
predetermining
       plaintext (WEP)   2nd  
predictive value (IDS)
       Bayes theorem  
       function of  
predictive values (IDS)
        likelihood ratios (LRs)   2nd   3rd  
preventing
       malicious scripts
               Web pages   2nd  
       virus infections   2nd  
PRG Algorithm
       RC4 algorithm
               WEP security   2nd   3rd   4th  
PRGA (Pseudo Random Generation Algorithm)
       RC4 encryption  
               example   2nd   3rd   4th  
               XOR with plaintext example   2nd  
prismdump program
       WEPCrack
               installing   2nd   3rd  
               prism-getIV.pl script   2nd  
               weakIVGen.pl script   2nd  
               WEPCrack.pl script   2nd  
probe request frames
       WNICs
               PEER mode   2nd   3rd   4th  
programming languages
       .NET   2nd  
       HTML  
       i-mode   2nd  
       Java   2nd  
       overview   2nd  
       WML   2nd   3rd  
       WMLScript   2nd   3rd  
       XHTML   2nd   3rd   4th  
       XML   2nd   3rd  
programs
       Pocket PC
               installing   2nd  
promiscuous mode
       Kismet  
       network cards (sniffers)   2nd   3rd  
protocols
       802.11 standard (IEEE)  
               CSMA/Collision Avoidance   2nd  
               overview   2nd  
               prior technologies  
       802.11a standard (IEEE)
               5GHz range  
               Orthogonal Frequency Division Multiplexing  
               overview  
               versus 802.11b standard   2nd  
       802.11b standard (IEEE)
               2.4 GHz range   2nd  
               DSSS (direct-sequence spread spectrum)  
               versus 802.11a standard   2nd  
       802.11g standard (IEEE)
               overview  
       802.3 standard (IEEE)
               CSMA/CD   2nd  
       Bluetooth
               communication process   2nd  
               development of  
               overview  
               piconet  
               security features   2nd  
               technical specifications  
       HomeRF
               FHSS standard   2nd  
               overview  
       IrDA
               overview   2nd   3rd  
               PANs (personal area networks)  
               potential light transmission problems  
       overview   2nd  
       TKIP (Temporal Key Integrity Protocol)
               Message Integrity Check   2nd   3rd  
               RC4 algorithm  
       WAP
               application stack   2nd   3rd   4th   5th   6th  
               PCS device browsing   2nd   3rd  
Pseudo Random Generation Algorithm (PRGA)
       RC4 encryption  
               example   2nd   3rd   4th  
               XOR with plaintext example   2nd  
public key algorithms
       Diffie-Hellman  
       DSA  
       RSA  
public key cryptography
       private keys  
       public key algorithms   2nd   3rd   4th  
       public keys  
Public Key Infrastructure,   [See PKI]
publications
       reference resources   2nd  



Maximum Wireless Security
Maximum Wireless Security
ISBN: 0672324881
EAN: 2147483647
Year: 2002
Pages: 171

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net