Index_V


V

Vendor-assisted hacking, 90
Verification, 149 “50
Violations Reporting Policy, 164
Virtual Ethernet Interface (VEI), 261
Virtual Local Area Networks (VLANs), 187 “88
configuration, 189 “90
support, 187
Virtual Private Networks (VPNs), 240 “60
advantages, 240, 241
concentrators , 262
connections, 242, 245
disadvantages, 242
industry acceptance, 242
IPSec/IKE, 249 “53
L2TP/IPSec, 247 “49
Layer 3, 243
linking, 240
Mobile IP and, 258 “60
over wireless medium, 241
port forwarding and, 255
PPTP, 246 “47
public key authentication and, 256 “58
RADIUS and, 292
redirection, 245
secure shells and, 254 “55
servers, 244
SFTP and, 253, 256
solution considerations, 243 “44
SSH2, 253
tunneling, 241
types, 244 “53
value, 272
in WLANs, 244
Virtual Router Redundancy Protocol (VRRP), 268
Virus incidents, 217
Voice communications, authority to intercept, 102
Voice-mail communications, 102 “3
Voice over IP (VoIP), 303



Wireless Operational Security
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net