Index P

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

packet keys
       RC4 algorithm
               WEP security   2nd  
packet splitting
       IDS hacker attacks  
Palm OS
        airborne viruses
               infection methods   2nd  
               Liberty Crack   2nd  
       Phage virus  
Palm PDAs   2nd  
Parabolic Grid Antennas
       HyperLink HG2419G   2nd  
               technical specifications   2nd  
pass-through authentication
       Funk Steel-Belted Server software (RADIUS)   2nd   3rd  
password generator utility (vxUtil)  
       dumpster diving   2nd  
       employee impersonations   2nd  
               encryption disadvantages  
               (Personal Communications Service)  
PCS devices
       .NET programming   2nd  
       browsing (WAP)   2nd   3rd  
               i-mode technology   2nd  
       Java 2 Micro Environment (J2ME)   2nd  
       sample WML cards   2nd  
               application creation  
       WML applications
               testing (Openwave SDK)  
               client-side scripting   2nd   3rd  
       Compaq iPAQ  
               features   2nd  
               technical specifications  
       Palm   2nd  
       PocketPC   2nd  
       programming languages   2nd  
               .NET   2nd  
               i-mode   2nd  
               Java   2nd  
               WML   2nd   3rd  
               WMLScript   2nd   3rd  
               XHTML   2nd   3rd   4th  
               XML   2nd   3rd  
               WAP   2nd   3rd   4th   5th   6th   7th   8th   9th  
PEER mode (WNICs)
       probe request frames   2nd   3rd   4th Web site  
Phage virus (Palm OS)   2nd  
       Bluetooth protocol  
       hacking tool   2nd  
ping sweeper utility (vxUtil)  
ping utility (NetForce)  
ping utility (vxUtil)  
       (Public Key Infrastructure)  
       certificate authorities (CAs)  
               certificate chain  
               trust issues  
               trusted root certificate  
               X.509 standard   2nd   3rd   4th   5th   6th   7th  
       digital signatures  
               one-way hash algorithm   2nd  
       public key cryptography  
               public key algorithms   2nd   3rd   4th  
       WAP PKI Model
               CA Public Key Certificates (WTLS Class 2)   2nd   3rd  
               certificate delivery   2nd  
               certificate enrollment   2nd  
               certificate management   2nd   3rd  
               certificate requests   2nd  
               Client Public Key Certificates (WMLScript SignText)   2nd   3rd   4th  
               Client Public Key Certificates (WTLS Class 3)   2nd   3rd  
               device certificates   2nd  
               limitations   2nd  
               security tokens   2nd   3rd   4th   5th   6th   7th   8th  
               Service and Device Management (SDM)   2nd   3rd  
               SmartTrust software   2nd  
               SmartTrust Wireless Internet Browser (WIB)   2nd  
               Trusted Operator Services (TOS)   2nd   3rd   4th   5th   6th  
               WIM implementation methods   2nd  
       wireless implementation
      example   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  
       predetrmining (WEP)   2nd  
Pocket PC
               access point searches   2nd   3rd   4th   5th  
               data capturing  
               filters   2nd   3rd  
               launching   2nd  
               overview   2nd  
               Web site resources   2nd  
       IBM Wireless Security Auditor
               application window  
               configuration screen  
               features   2nd  
               GPS support  
               Help menu  
               root background window  
               supported WNICs  
               access point searches   2nd  
               launching   2nd  
       Net Force
               installing   2nd   3rd   4th  
               installing   2nd  
               installing   2nd   3rd   4th  
       WLAN drivers
               installing   2nd  
PocketPC PDA   2nd  
port scanner utility (NetForce)  
port scanner utility (vxUtil)  
       Trojan horses
               client/server side   2nd  
PPP (Point-to-Point Protocol)  
PPTP (Point-to-Point Tunneling Protocol)  
       plaintext (WEP)   2nd  
predictive value (IDS)
       Bayes theorem  
       function of  
predictive values (IDS)
        likelihood ratios (LRs)   2nd   3rd  
       malicious scripts
               Web pages   2nd  
       virus infections   2nd  
PRG Algorithm
       RC4 algorithm
               WEP security   2nd   3rd   4th  
PRGA (Pseudo Random Generation Algorithm)
       RC4 encryption  
               example   2nd   3rd   4th  
               XOR with plaintext example   2nd  
prismdump program
               installing   2nd   3rd  
      script   2nd  
      script   2nd  
      script   2nd  
probe request frames
               PEER mode   2nd   3rd   4th  
programming languages
       .NET   2nd  
       i-mode   2nd  
       Java   2nd  
       overview   2nd  
       WML   2nd   3rd  
       WMLScript   2nd   3rd  
       XHTML   2nd   3rd   4th  
       XML   2nd   3rd  
       Pocket PC
               installing   2nd  
promiscuous mode
       network cards (sniffers)   2nd   3rd  
       802.11 standard (IEEE)  
               CSMA/Collision Avoidance   2nd  
               overview   2nd  
               prior technologies  
       802.11a standard (IEEE)
               5GHz range  
               Orthogonal Frequency Division Multiplexing  
               versus 802.11b standard   2nd  
       802.11b standard (IEEE)
               2.4 GHz range   2nd  
               DSSS (direct-sequence spread spectrum)  
               versus 802.11a standard   2nd  
       802.11g standard (IEEE)
       802.3 standard (IEEE)
               CSMA/CD   2nd  
               communication process   2nd  
               development of  
               security features   2nd  
               technical specifications  
               FHSS standard   2nd  
               overview   2nd   3rd  
               PANs (personal area networks)  
               potential light transmission problems  
       overview   2nd  
       TKIP (Temporal Key Integrity Protocol)
               Message Integrity Check   2nd   3rd  
               RC4 algorithm  
               application stack   2nd   3rd   4th   5th   6th  
               PCS device browsing   2nd   3rd  
Pseudo Random Generation Algorithm (PRGA)
       RC4 encryption  
               example   2nd   3rd   4th  
               XOR with plaintext example   2nd  
public key algorithms
public key cryptography
       private keys  
       public key algorithms   2nd   3rd   4th  
       public keys  
Public Key Infrastructure,   [See PKI]
       reference resources   2nd  

Maximum Wireless Security
Maximum Wireless Security
ISBN: 0672324881
EAN: 2147483647
Year: 2002
Pages: 171

Similar book on Amazon © 2008-2017.
If you may any questions please contact us: