Flylib.com
Index_V
Previous page
Table of content
Next page
V
Vendor-assisted hacking, 90
Verification, 149 “50
Violations Reporting Policy, 164
Virtual Ethernet Interface (VEI), 261
Virtual Local Area Networks (VLANs), 187 “88
configuration, 189 “90
support, 187
Virtual Private Networks (VPNs), 240 “60
advantages, 240, 241
concentrators , 262
connections, 242, 245
disadvantages, 242
industry acceptance, 242
IPSec/IKE, 249 “53
L2TP/IPSec, 247 “49
Layer 3, 243
linking, 240
Mobile IP and, 258 “60
over wireless medium, 241
port forwarding and, 255
PPTP, 246 “47
public key authentication and, 256 “58
RADIUS and, 292
redirection, 245
secure shells and, 254 “55
servers, 244
SFTP and, 253, 256
solution considerations, 243 “44
SSH2, 253
tunneling, 241
types, 244 “53
value, 272
in WLANs, 244
Virtual Router Redundancy Protocol (VRRP), 268
Virus incidents, 217
Voice communications, authority to intercept, 102
Voice-mail communications, 102 “3
Voice over IP (VoIP), 303
Previous page
Table of content
Next page
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153
Authors:
John Rittinghouse PhD CISM
,
James F. Ransome PhD CISM CISSP
BUY ON AMAZON
Crystal Reports 9 on Oracle (Database Professionals)
Connectivity, Authentication, and Privileges
Oracle Advanced SELECT Options
PL/SQL
Optimizing: The Crystal Reports Side
Optimizing: Reducing Parses
C++ How to Program (5th Edition)
Computer Organization
Case Study: Payroll System Using Polymorphism and Run-Time Type Information with Downcasting, dynamic_cast, typeid and type_info
Random-Access Files
Associative Containers
Self-Review Exercises
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The Pulsing Heart of ASP.NET AJAX
The AJAX Control Toolkit
Built-in Application Services
Remote Method Calls with ASP.NET AJAX
Building AJAX Applications with ASP.NET
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Increasing Persuasion through Mobility and Connectivity
The Ethics of Persuasive Technology
Captology Looking Forward
.NET-A Complete Development Cycle
Visual Studio.NET: Platform of Choice
Unit Tests
Analysis of the Image Postprocessing Requirements
Project Management Issues
Requirements for Performance Optimization
User Interfaces in C#: Windows Forms and Custom Controls
Classic Controls
Design-Time Support for Custom Controls
Data Controls
GDI+ Basics
Help and Application-Embedded Support
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies