Index R


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

radiation zone
       access point-based security   2nd   3rd   4th   5th  
       signal bleeding   2nd   3rd   4th   5th  
radio frequency (RF) energy   2nd  
radio spectrum
       FCC defined frequencies   2nd   3rd   4th   5th  
RADIUS
       (Remote Authentication Dial-In User Service)  
       Funk Steel-Belted Server software   2nd   3rd  
               accounting methods  
               authentication methods   2nd   3rd  
               hardware admninistration features   2nd  
               rogue access point regulation  
               system requirements   2nd  
               typical server configuration  
               user admninistration features   2nd  
       servers
               WLAN security  
RAM
       buffer overflow attacks   2nd   3rd  
RC4 algorithm
       TKIP (Temporal Key Integrity Protocol)  
       WEP security  
               checksums  
               decryption process  
               Key Scheduling Algorithm   2nd   3rd   4th   5th   6th  
               Key Scheduling Algorithm functions   2nd  
               packet keys   2nd  
               PRG Algorithm   2nd   3rd   4th  
RC4 encryption
       algorithm  
               leakage of  
       algorithms
               Key Scheduling Algorithm (KSA)   2nd   3rd   4th   5th   6th   7th  
               Pseudo Random Generation Algorithm (PRGA)   2nd   3rd   4th   5th   6th   7th  
       ciphers  
               block   2nd  
               self-synchronizing stream   2nd  
               stream   2nd  
       Initialization Vector (IV)   2nd  
       RSA Data Security development  
       SSL protocol  
       states   2nd  
               array creation   2nd  
       WEP
               64-bit/128-bit   2nd   3rd  
               implementation   2nd  
               key strength   2nd   3rd  
               live wireless data transmission example   2nd   3rd  
       WEP protocol  
               Initialization Vector (IV) weaknesses  
               Intialization Vector (IV) weaknesses  
       XOR function
               PRGA with plaintext example   2nd  
               sample comparison   2nd   3rd   4th  
recovering
       lost passwords
               legality of  
reference resources   2nd  
Remote-Access Model (VPNs)  
resources
        publications   2nd  
       Web sites   2nd  
Rijndael algorithm
       AES (Advanced Encryption Standard)   2nd  
ROC curves
       (receiver operating characteristics)  
       IDS accuracy measure  
rogue access points
       Funk Steel-Belted Server software (RADIUS)  
       VPNs  
rogue Access Points (APs)   2nd   3rd   4th  
RSA algorithm (PKI)  
RSA Data Security
       RC4 encryption development  



Maximum Wireless Security
Maximum Wireless Security
ISBN: 0672324881
EAN: 2147483647
Year: 2002
Pages: 171

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net