List of Figures


Chapter 2: Managing Access

Figure 2.1: Examples of Access Control Lists (ACLs).

Chapter 7: Wireless Networking Basics

Figure 7.1: How 802.11 works in the OSI Model.
Figure 7.2: A certificate chain.
Figure 7.3: A solo certificate.
Figure 7.4: A long certificate chain.
Figure 7.5: Certificate validation process.
Figure 7.6: Public key encryption and decryption as used in a PKI.
Figure 7.7: Certificate authority process hierarchy.
Figure 7.8: The digital signature process.
Figure 7.9: A mobile transaction involving multiple intermediaries.
Figure 7.10: Sign-on process involving an authentication server.
Figure 7.11: Federation of single sign-on domains.

Chapter 10: WLAN Risk and Threat Mitigation

Figure 10.1: The OSI model and an example of functional layering for WLANs.
Figure 10.2: Segmentation of wired and wireless network segments.

Chapter 12: WISDOM for WLAN Practitioners

Figure 12.1: WISDOM Basic Security topology.
Figure 12.2: WISDOM Intermediate Security topology.
Figure 12.3: WISDOM Advanced Security topology.



Wireless Operational Security
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net