Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 2: Managing Access
Figure 2.1: Examples of Access Control Lists (ACLs).
Chapter 7: Wireless Networking Basics
Figure 7.1: How 802.11 works in the OSI Model.
Figure 7.2: A certificate chain.
Figure 7.3: A solo certificate.
Figure 7.4: A long certificate chain.
Figure 7.5: Certificate validation process.
Figure 7.6: Public key encryption and decryption as used in a PKI.
Figure 7.7: Certificate authority process hierarchy.
Figure 7.8: The digital signature process.
Figure 7.9: A mobile transaction involving multiple intermediaries.
Figure 7.10: Sign-on process involving an authentication server.
Figure 7.11: Federation of single sign-on domains.
Chapter 10: WLAN Risk and Threat Mitigation
Figure 10.1: The OSI model and an example of functional layering for WLANs.
Figure 10.2: Segmentation of wired and wireless network segments.
Chapter 12: WISDOM for WLAN Practitioners
Figure 12.1: WISDOM Basic Security topology.
Figure 12.2: WISDOM Intermediate Security topology.
Figure 12.3: WISDOM Advanced Security topology.
Previous page
Table of content
Next page
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153
Authors:
John Rittinghouse PhD CISM
,
James F. Ransome PhD CISM CISSP
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Security Requires Information Classification
Level II Assessments
Building the Final Report
Document Tracking Form
Typical RFP Procurement Steps
Developing Tablet PC Applications (Charles River Media Programming)
Basics of the .NET Framework
Strings, GDI+, and Error Handling in VB .NET
Math and Random Number Functions in VB .NET
Console Application Input/Output
WMI and Hardware
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Local Area Network (LAN) Technologies
Point-to-Point Protocol (PPP)
Dynamic Host Configuration Protocol (DHCP) Server Service
Windows Internet Name Service (WINS)
Internet Information Services (IIS) and the Internet Protocols
Postfix: The Definitive Guide
Email and the Internet
Separate Domains with System Accounts
Delivery to Commands
Spam Detection
C.5. Compiling Add-on Packages
Information Dashboard Design: The Effective Visual Communication of Data
Cluttering the Display with Useless Decoration
Tapping into the Power of Visual Perception
Select the Best Display Medium
Sample Sales Dashboard
A Final Word
FileMaker 8 Functions and Scripts Desk Reference
Get Functions
Filter()
GetAsTime()
Min()
Pi
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies