[SYMBOL][A][B][C][D][E][F][G][H][I][J][K][L][M][N][O][P][Q][R][S][T][U][V][W]
802.11 enhancements
mesh networking
MIMO and data rates
network performance and roaming
fast BSS transitions
Radio Resource Measurement Enhancements
quality of service
spectrum management
dynamic frequency selection
transmit power control
802.11 MAC layer
discovering and joining network
distribution system services
station services
wireless media access
802.11 PHY layer
802.11 WLAN standards
characteristics
enhancements
mesh networking
MIMO and data rates
network performance and roaming
quality of service
spectrum management
HiperLAN/2,
Home Radio Frequency
MAC layer
discovering and joining network
distribution system services
station services
wireless media access
origins and evolution
PHY layer
802.11a PHY layer
802.11b PHY layer
802.11g PHY layer
data rates, at PHY and MAC layer
802.11a PHY layer, 2nd
802.11a protocol, 2nd, 3rd
802.11b PHY layer, 2nd
802.11b protocol, 2nd, 3rd
802.11g PHY layer, 2nd
802.11g protocol, 2nd, 3rd
802.1X RADIUS authentication, understanding and configuring
802.1X standard
Microsoft RADIUS servers
using EAP-TLS on Microsoft network
802.1X standard, 2nd
ABC Inc. InfoSec Acceptable Use Policy
ABC Inc. InfoSec Anti-Virus Policy
ABC Inc. InfoSec Application Password Policy
ABC Inc. InfoSec Audit Policy
ABC Inc. InfoSec De-Militarized Zone (DMZ) Policy
ABC Inc. InfoSec Dial-In Access Policy
ABC Inc. InfoSec Extranet Policy
ABC Inc. InfoSec Network Policy
ABC Inc. InfoSec Password Policy
ABC Inc. InfoSec Policy Exception Form
ABC Inc. InfoSec Remote Access Policy
ABC Inc. InfoSec Risk Assessment Policy
ABC Inc. InfoSec Router Policy
ABC Inc. InfoSec Server Policy
ABC Inc. InfoSec VPN Communication Policy
ABC Inc. InfoSec Wireless Communication Policy
Access control
administration models
centralized administration model
decentralized administration model
hybrid administration model
and origins of computer security theory
criteria
entities
fundamental concepts
accountability
assurance
security policy establishment
mechanisms
access control lists
advanced ACLs
constrained user interfaces
elementary ACLs
encryption
external access controls
host-based authentication
internal access controls
passwords
port protection devices
secure gateways, types of
secure gateways/firewalls
methods to bypass
models
data categorization
discretionary access control model
mandatory access control
nondiscretionary access control model
purpose
uses
access control lists
Access control lists (ACLs)
Access control matrix
access control, and origins of computer security theory
Access management
access control
administration models
criteria
entities
fundamental concepts
mechanisms
methods to bypass
models
purpose
uses
password management
biometric systems
characteristics
password attack countermeasures
password cracking
SmartCards
access points, 2nd, 3rd, 4th
Access points (AP)
accountability
Active RFID tags
address field
Address field
address resolution protocol, 2nd
Address resolution protocol (ARP)
administration models
advanced ACLs
advanced digital modulation, 2nd
Advanced digital modulation
Advanced Encryption Standard (AES)
Advanced wireless security implementation
802.1X RADIUS authentication, understanding and configuring
802.1X standard
Microsoft RADIUS servers
using EAP-TLS on Microsoft network
Linksys WRV54G VPN broadband router
Linksys WRV54G, enabling VPN on
Windows 2000/XP computers preparation, for use with WRV54G
RADIUS with Cisco LEAP, implementing
LEAP features
LEAP solution, building
LEAP, configuring
review
Steel Belted RADIUS, installing and configuring
Windows Active Directory domain authentication, with LEAP and RADIUS
wireless gateway with Reef Edge Dolphin, implementing
Dolphin, configuring
Dolphin, installing
review
user experience, improving
WPA implementation
D-Link DI-624 AirPlus 2.4 GHz Xtreme G wireless router with 4-port switch, configuring
Linksys WRV54G VPN broadband router, configuring
Windows XP wireless Clients, configuring
advantages, 2nd
advantages of, 2nd, 3rd
AiroPeek NX, 2nd
algorithms
alternatives, 2nd
an introduction
analog baseband conditioning, 2nd
Analog baseband conditioning
analog communication, 2nd
Analog communication
analog transmission, 2nd
Analog transmission
and authentication
and future, 2nd
and handoffs
and MIMO
and origins of computer security theory
and protocols
anonymity in, 2nd, 3rd
anonymity, in GSM
anonymity, in UMTS
antennas, 2nd, 3rd
Antennas
and WLAN equipment, use of
wireless cards
antivirus software installation, 2nd
Antivirus software installation
ARQ (automatic repeat query) protocol
arrays, 2nd
assurance
at PHY and MAC layer
attack objectives
attacks
Attacks and risks
employee sabotage
fraud and theft
industrial espionage
infrastructure attacks
internet fraud
malicious coders
malicious hackers
personal privacy, threats to
social engineering
corporate social engineering policy, crafting
staff and security personnel, educating
audits
authentication, 2nd, 3rd, 4th, 5th
authentication in, 2nd, 3rd
authentication weaknesses, exploiting, 2nd, 3rd
Authentication, in 802.11 networks
and handoffs
drawbacks
open system authentication
pseudo-authentication schemes
shared key authentication
authentication, in GSM
authentication, in UMTS
backend
bandwidth, 2nd
Bandwidth
baseband coding
Baseband coding
analog baseband conditioning
digital systems
baseband data format and protocol
Baseband data format and protocol
analog transmission
change-of-state source data
address field
baseband data rate
code-hopping addressing technique
data field
dip switch
internal fixed code identity
parity bit field
supervision
continuous digital data
baseband data rate
Baseband data rate
basics, 2nd
biometric systems, 2nd
Biometric systems
blended attacks
Blended attacks
blending attacks
Bluetooth, 2nd, 3rd
authentication
basics
confidentiality
enhancements
features
integrity protection
key establishment
algorithms
broadcast key hierarchy
constraint key
encryption key
Initialization Key
Link Key
Pass Key
payload key
security modes
bluetooth and WPANs
Bluetooth devices
broadcast key hierarchy
capacity
cards
Cards
Carrier sense multiple access/collision detection (CSMA/CD)
cellular technologies, 2nd
Cellular technologies
centralized administration model
change-of-state source data
Change-of-state source data
changing
characteristics, 2nd, 3rd
Chip
choosing
civil structure monitoring
client hijacking, 2nd
Client hijacking
Closed system authentication
code security
Code security
code-hopping addressing technique
Code-hopping addressing technique
Communication protocols and modulation
baseband coding
analog baseband conditioning
digital systems
baseband data format and protocol
analog transmission
change-of-state source data
continuous digital data
modulation
advanced digital modulation
analog communication
continuous digital communication
for digital event communication
spread spectrum
RF frequency and bandwidth
RFID
Communication service providers, emergency disclosures by
communications providers, emergency disclosures by
computer trespassers, intercepting communications of
confidentiality, 2nd, 3rd, 4th
confidentiality in, 2nd, 3rd
confidentiality weaknesses, exploiting, 2nd, 3rd
confidentiality, in GSM
confidentiality, in UMTS
configuring, 2nd, 3rd, 4th
connection
constrained user interfaces
Constrained user interfaces
constraint key
Constraint key
constraints, 2nd
continuous digital communication
Continuous digital communication
digital modulation methods, comparison of
phase shift keying
continuous digital data, 2nd
Continuous digital data
Corporate social engineering policy
audits
prevention
corporate social engineering policy, crafting, 2nd
Credit cards
criteria, 2nd
cryptographic algorithms
cryptographic weaknesses, exploiting, 2nd, 3rd
cryptography
Cryptography
and protocols
cryptographic algorithms
choosing
hashing
in practice
needs of
optimization
tailoring security
cryptography and protocols
cryptography in practice
current standards
cybersecurity forensic capabilities, development of
cyberterrorism, deterrence and prevention of
Cyberterrorism, deterrence and prevention of
damage aggregation
damaging computers, for national security/criminal justice purposes
data categorization
data field
Data field
data flooding, 2nd
Data flooding
Data integrity
and authentication
in 802.11,
data integrity in
data integrity weaknesses, exploiting, 2nd, 3rd
Data link layer technologies
logical link control
MAC
in wired networks
in wireless networks
Data rates
and MIMO
at PHY and MAC layer
data rates, at PHY and MAC layer
decentralized administration model
decryption tools
definition
Denial-of-service attacks and tools
client hijacking
data flooding
RF jamming
diffraction
Diffraction
digital certificates
Digital certificates
Digital event communication, modulation for
digital modulation methods, comparison of, 2nd
Digital modulation methods, comparison of
digital signatures
Digital signatures
digital systems, 2nd
Digital systems
dip switch
Dip switch
direct sequence
Direct sequence spread spectrum (DSSS)
advantages
disadvantages of
discovering and joining network, 2nd
Discretionary access control
discretionary access control model
distribution system services, 2nd
diversity implementation
Diversity techniques
frequency diversity
implementation
polarization diversity
space diversity
statistical performance measure
D-Link DI-624 AirPlus 2.4 GHz Xtreme G wireless router with 4-port switch
configuring
enabling security features on
MAC address, filtering by
SSID broadcast, disabling
unique SSID, setting
WEP, enabling
D-Link DI-624 AirPlus 2.4 GHz Xtreme G wireless router with 4-port switch, configuring, 2nd
Dolphin implementation
configuring
installing
user experience, improving
Dolphin review
Dolphin, configuring, 2nd
Dolphin, installing, 2nd
drawbacks, 2nd
drowning, in acronyms, 2nd
DSSS and FHSS, advantages of
dynamic frequency selection, 2nd
Dynamic frequency selection
Dynamic NAT
effects
electronic evidence, scope of subpoenas for
Electronic Product Code
elementary ACLs
emitter beam pattern
Emitter beam pattern
employee sabotage
Employee sabotage
encryption
Encryption and password protection
encryption in
encryption key
Encryption key
encryption, in wireless network, 2nd
enhancements, 2nd
entities, 2nd
establishment, 2nd, 3rd
establishment in, 2nd
establishment protocol of
establishment, in GSM
establishment, in UMTS
Ethernet
ethics
Ettercap, 2nd, 3rd
exploitable WLAN configurations
exposed terminal problem, 2nd
Exposed terminal problem
external access controls
External access controls
fast BSS transitions, 2nd
Fast BSS transitions
fast track solutions
features
FireWire
first generation
Fixed gain antennas
fixed wireless MAN antennas, 2nd
Fixed wireless MAN antennas
fixed wireless MAN devices, 2nd
Fixed wireless MAN devices
Flat fading
Rayleigh fading
for digital event communication, 2nd
for self-defense
fraud and theft
frequency diversity, 2nd
Frequency diversity
frequency hopping
Frequency hopping spread spectrum (FHSS)
advantages
fundamental concepts
future developments
future standards
GSM
anonymity in
authentication in
confidentiality in
establishment in
vulnerability in
hacker's intent vs. degree of damages
hackers, raising maximum penalty for
hardware
hardware devices
hashing
Hashing
hidden terminal problem, 2nd
Hidden terminal problem
HiperLAN/2,, 2nd
history, 2nd
Home network security
hotspot security measures
measures
antivirus software installation
encryption, in wireless network
home wireless network, securing
logs, reviewing
personal firewall installation
public wireless networks
restrict access, to wireless network
SSID, changing
wireless network, configuring
wireless networks
802.11a protocol
802.11b protocol
802.11g protocol
next-generation protocols
Home Radio Frequency
Home Radio Frequency (HomeRF)
home wireless network, securing, 2nd
Homeland Security Act (2002), 2nd
host-based authentication
hotspot security measures
Hotspots
connection
security measures
hybrid administration model
hybrid star and mesh network
Hybrid star and mesh network
Identification Friend and Foe (IFF)
Identity-based discretionary access control
IEEE 1451.5 standard
IEEE 802.11 standard
IEEE 802.11a standard
IEEE 802.11b standard
IEEE 802.11g standard
IEEE 802.11h standard
IEEE 802.15.4 standard, 2nd, 3rd
IEEE1451.5 standard, 2nd
IEEE802.11 standard
IEEE802.11x
implementation
in 802.11,
in practice, 2nd
in wired networks, 2nd
in wireless networks, 2nd
industrial automation
industrial espionage
Industrial espionage
Infrared (Ir) communication
Ir spectrum
propagation and reception
emitter beam pattern
inverse square loss
Ir detector sensitivity
Ir link distance
transmitted power density
infrastructure attacks
Initialization Key
Initialization Key (IK/K INIT)
Initialization vector
installing
Integrated Services Digital Network (ISDN)
integrity, 2nd
integrity protection, 2nd
integrity protection in
integrity protection, in UMTS
intercepting
internal access controls
internal fixed code identity
Internal fixed code identity
internet fraud
Internet fraud
Internet Protocol Version, 2nd
Internet Protocol Version 6 (IPv6)
Intrusion process
antennas and WLAN equipment, use of
antennas
wireless cards
denial-of-service attacks and tools
client hijacking
data flooding
RF jamming
exploitable WLAN configurations
network access to WLAN
authentication weaknesses, exploiting
confidentiality weaknesses, exploiting
cryptographic weaknesses, exploiting
data integrity weaknesses, exploiting
MAC address spoofing and circumventing filters
rogue AP exploitation
WEP decryption tools
WLAN attacks
password gathering, and cracking software
Ettercap
L0phtCrack
Lucent Registry Crack
WinSniffer
wireless protocol analyzers
publicly available resources
rogue devices, as exploitation tools
access points
wireless bridges
share enumerators
social engineering
target profiling
war-driving, -walking, -flying, and –chalking
network discovery tools
networking utilities
WLAN audit and discovery tools
inverse square loss
Inverse square loss
investigations
IP addressing, 2nd, 3rd
IPSEC, 2nd
Ir detector sensitivity, 2nd
Ir link distance, 2nd
Ir spectrum, 2nd
L0phtCrack, 2nd, 3rd
Label
LANs
LEAP features
LEAP solution, building, 2nd
LEAP, configuring, 2nd
lightweight access point protocol, 2nd
Lightweight access point protocol
Link Key
Link Key (LK)
Linksys BEFW11 SR 802.11b access point/router, enabling security features on
MAC address, filtering by
SSID broadcast, disabling
unique SSID, setting
WEP, enabling
Linksys WAP11 802.11b access point, enabling security features on
SSID broadcast, disabling
unique SSID, setting
WEP, enabling
Linksys WRT54G 802.1 lb/g access point/router, enabling security features on
MAC address, filtering by
SSID broadcast, disabling
unique SSID, setting
WEP, enabling
Linksys WRV54G VPN broadband router
configuring
Linksys WRV54G, enabling VPN on
Windows 2000/XP computers preparation, for use with WRV54G
Linksys WRV54G VPN broadband router, configuring, 2nd
Linksys WRV54G, enabling VPN on, 2nd
Linux clients, configuring, 2nd, 3rd
Local area networks (LANs)
logical link control, 2nd
Logical link control (LLC)
logs, reviewing, 2nd
Logs, reviewing
loopholes in security
loss, definition of
Loss, definition of
Lucent Registry Crack, 2nd
Lucent Registry Crack (LRC)
MAC
MAC address spoofing and circumventing filters, 2nd, 3rd
MAC address, filtering by, 2nd, 3rd, 4th, 5th, 6th, 7th
MAC in, 2nd
malicious coders
Malicious coders
malicious hackers
Malicious hackers
management, 2nd
mandatory access control
mandatory minimum sentences elimination
MANET
mechanisms
mechanisms of
Media access control (MAC)
addressing
spoofing and circumventing filters
in wired networks
in wireless networks
mesh network
mesh networking, 2nd
mesh networks, 2nd
Mesh networks
message digests
methods to bypass, 2nd
Microsoft RADIUS servers, 2nd, 3rd
middleware, 2nd
Middleware software
MIMO and data rates, 2nd
MIMO, and data rates
MiniStumbler, 2nd
mobile wireless MAN devices, 2nd
Mobile wireless MAN devices
models
modulation
Modulation
advanced digital modulation
analog communication
continuous digital communication
digital modulation methods, comparison of
phase shift keying
for digital event communication
spread spectrum
direct sequence
DSSS and FHSS, advantages of
frequency hopping
multipath phenomena
Multipath phenomena
National Information Infrastructure Protection Act (1996), 2nd
nationwide search warrants for e-mail
Near Field
needs of
NetStumbler, 2nd
Network access, to WLAN
authentication weaknesses, exploiting
confidentiality weaknesses, exploiting
cryptographic weaknesses, exploiting
data integrity weaknesses, exploiting
MAC address spoofing and circumventing filters
rogue AP exploitation
WEP decryption tools
WLAN attacks
network address translation, 2nd
Network address translation (NAT)
network discovery tools
Network discovery tools
network domain security, 2nd
Network layer technologies
address resolution protocol
Internet Protocol Version
IP addressing
network address translation
port address translation
private IP addresses
routing
Network name
network performance and roaming
Network performance and roaming
fast BSS transitions
Radio Resource Measurement Enhancements
networking utilities
Networking utilities
next-generation protocols, 2nd
Next-generation protocols
noise
Noise
nondiscretionary access control model
obtaining
open field propagation
Open field propagation
open system authentication
Open Systems Interconnect (OSI) model
operating system considerations
Operating system considerations
optimization
origins and evolution
OSI network model
“protected computer” and computers in foreign countries
parity bit field
Parity bit field
Pass Key
Pass Key (PKEY)
Passive RFID tags
password attack countermeasures, 2nd
password cracking
Password gathering, and cracking software
Ettercap
L0phtCrack
Lucent Registry Crack
WinSniffer
wireless protocol analyzers
Password management
biometric systems
characteristics
password attack countermeasures
password cracking
for self-defense
John the Ripper
Unix “Crack”,
Windows NT L0phtCrack
SmartCards
passwords
path loss
Path loss
payload key
Payload key (PK)
pen register and trap and trace statute
performance, 2nd
personal firewall installation, 2nd
Personal firewall installation
personal privacy, threats to
phase shift keying, 2nd
Phase shift keying (PSK)
physical layer technologies, 2nd
Physical layer technologies
wired networks
wireless networks
planning
point-to-point connections, 2nd
polarization diversity, 2nd
Polarization diversity
port address translation, 2nd
Port address translation
port protection devices
Port protection devices (PPD)
power consideration in
power consumption
power over Ethernet
President's Executive Order, on critical infrastructure protection, 2nd
prevention
private IP addresses, 2nd
Private IP addresses
protocol madness
protocols
pseudo-authentication schemes
Pseudo-authentication schemes, in 802.11,
public wireless networks, 2nd
Public wireless networks
public-key cryptography
Public-key cryptography
Public-Key Infrastructure (PKI) 252–4,
alternatives
Public-Key Infrastructures
publicly available resources
purpose, 2nd
Quadrature amplitude modulation (QAM)
quality of service, 2nd
Radio communication
communication protocols and modulation
baseband coding
baseband data format and protocol
modulation
RF frequency and bandwidth
RFID
diffraction
diversity techniques
diversity implementation
frequency diversity
polarization diversity
space diversity
statistical performance measure
flat fading
rayleigh fading
multipath phenomena
noise
open field propagation
path loss
radio wave propagation, mechanisms of
scattering
Radio frequency identification (RFID) security
architecture
middleware
reader
tag/label
data communications
protocols
tag data
management
risk and vulnerable assessment
risk management
threat management
physical form factor
cards
key fobs
radio waves
threat and target identification
attack objectives
blending attacks
radio frequency manipulation
Radio options, for physical layer
Bluetooth
IEEE 802.15.4 standard
IEEE1451.5 standard
IEEE802.11 standard
ZigBee
radio propagation effects, 2nd
Radio Resource Measurement Enhancements, 2nd, 3rd
radio wave propagation, mechanisms of
radio waves
Radio waves
propagation
effects
mechanisms of
RADIUS with Cisco LEAP, implementing
features
LEAP solution, building
LEAP, configuring
review
Steel Belted RADIUS, installing and configuring
Windows Active Directory domain authentication, with LEAP and RADIUS
rayleigh fading
Rayleigh fading, 2nd
reader
Reader
requirements of
restrict access to
restrict access, to wireless network, 2nd
review, 2nd, 3rd
RF frequency and bandwidth, 2nd
RF frequency, and bandwidth
RF jamming, 2nd, 3rd
RFID, 2nd
risk and vulnerable assessment
risk management
Risk, definition
Robust Security Network (RSN)
rogue AP exploitation, 2nd, 3rd
Rogue AP exploitation
Rogue devices, as exploitation tools
access points
wireless bridges
routing, 2nd
Routing
scattering
Scattering
scope of cable act, clarifying
secure gateways, types of
secure gateways/firewalls
Secure gateways/firewalls
types of
Secure Shell
Secure Shell (SSH)
Secure Sockets Layer (SSS)
history
in practice
Public-Key Infrastructure
alternatives
session
under hood
Security
access control, and origins of computer security theory
and law
communications providers, emergency disclosures by
computer trespassers, intercepting communications of
cybersecurity forensic capabilities, development of
cyberterrorism, deterrence and prevention of
damage aggregation
damaging computers, for national security/criminal justice purposes
electronic evidence, scope of subpoenas for
ethics
hacker's intent vs. degree of damages
hackers, raising maximum penalty for
Homeland Security Act (2002)
investigations
loss, definition of
mandatory minimum sentences elimination
National Information Infrastructure Protection Act (1996)
nationwide search warrants for e-mail
pen register and trap and trace statute
President's Executive Order, on critical infrastructure protection
“protected computer” and computers in foreign countries
scope of cable act, clarifying
state convictions counting as “prior offenses”,
USA Patriot Act (2001)
voice communications, intercepting
voice-mail, obtaining
wiretapping procedures, changes to
data integrity and authentication
digital certificates
digital signatures
message digests
Public-Key Infrastructures
definition
policies
cryptography
public-key cryptography
symmetric cryptography
security measures
security modes, 2nd
security policy establishment
security process
Semi-passive tags
Service Set Identifier (SSID)
changing
session
Shadow fading
share enumerators
Share enumerators
shared key authentication
Shared key authentication (SKA)
SIM cloning
Sliding correlator
smart antennas
Smart antennas
SmartCards, 2nd, 3rd
Sniffer wireless
Sniffer Wireless
social engineering
Social engineering
corporate social engineering policy, crafting
staff and security personnel, educating
space diversity, 2nd
Space diversity
spectrum management
Spectrum management
dynamic frequency selection
transmit power control
spoofing and circumventing filters
spread spectrum
Spread spectrum
direct sequence
advantages of
frequency hopping
advantages of
SSID broadcast, disabling, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
SSID, changing, 2nd
staff and security personnel, educating, 2nd
Standardized security
cryptography and protocols
history
in practice
cryptographic algorithms
cryptography in practice
popular alternative protocols
IPSEC
Secure Shell
Wrap-Up
protocol madness
star network
Star network
star topologies
star topologies, in wireless networks
state convictions counting as “prior offenses”,
Static NAT
station services, 2nd
statistical performance measure, 2nd
Steel Belted RADIUS, installing and configuring, 2nd, 3rd
structural health monitoring–smart structures
supervision
Supervision
switches or controllers, 2nd
symmetric cryptography
Symmetric cryptography
Tag
tag data
Tag data
tag data, manipulating
tag/label
tailoring security
target profiling
Target profiling
Threat and target identification
attack objectives
backend
middleware
radio frequency manipulation
tag data, manipulating
blended attacks
threat management
topologies
traditional fixed gain antennas
Traditional wireless networks (TWNs), security in
2.5 generation
code security
WAP
3G
anonymity, in UMTS
authentication, in UMTS
confidentiality, in UMTS
establishment, in UMTS
integrity protection, in UMTS
network domain security
UMTS security process
first generation
second generation
anonymity, in GSM
authentication, in GSM
confidentiality, in GSM
establishment, in GSM
vulnerability in, GSM security
transmit power control, 2nd
Transmit power control
transmitted power density
Transmitted power density
Transponders
types of
ultra wideband
Ultra Wideband (UWB)
UMTS
anonymity in
authentication in
confidentiality in
establishment in
integrity protection in
network domain security
security process
UMTS security process
under hood
unique SSID, setting, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
Universal Serial Bus (USB)
Unix “Crack”,, 2nd
USA Patriot Act (2001), 2nd
user experience, improving, 2nd, 3rd
uses, 2nd
using EAP-TLS on Microsoft network, 2nd
Virtual Private Network (VPN)
Voice communications
intercepting
obtaining
voice communications, intercepting
voice-mail, obtaining
Voice-mail, obtaining
vulnerability in
vulnerability in, GSM security
WAP
War-chalking
War-driving
War-flying
War-walking
Web-based e-mail
WEP decryption tools, 2nd, 3rd
WEP, enabling, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
Wi-Fi, 2nd
Wi-Fi Protected Access (WPA)
authentication
confidentiality
establishment
implementation
D-Link DI-624 AirPlus 2.4 GHz Xtreme G wireless router with 4-port switch, configuring
Linksys WRV54G VPN broadband router, configuring
Windows XP Wireless clients, configuring
integrity
management
Windows 2000 clients, configuring, 2nd, 3rd
Windows 2000/XP computers preparation, for use with WRV54G, 2nd, 3rd
Windows Active Directory domain authentication, with LEAP and RADIUS, 2nd, 3rd
Windows NT L0phtCrack
Windows NT L0phtCrack (LC4)
Windows XP clients, configuring, 2nd
Windows XP wireless clients, configuring
Windows XP wireless Clients, configuring
Windows XP Wireless clients, configuring
WinSniffer, 2nd, 3rd
Wired Equivalent Privacy (WEP)
decryption tools
drawbacks
wired network topologies
wired networks, 2nd
Wired networks
MAC in
physical layer technologies
topologies
Wireless ad hoc networks, security in
Bluetooth
authentication
basics
confidentiality
enhancements
establishment
integrity protection
security modes
Wireless Application Protocol (WAP)
wireless bridges, 2nd
Wireless bridges
wireless cards, 2nd
Wireless cards
Wireless clients, security features on
Linux clients, configuring
Windows 2000 clients, configuring
Windows XP clients, configuring
Wireless embedded system security
Bluetooth
wireless technologies
and future
cellular technologies
drowning, in acronyms
Wi-Fi
WPA authentication
WPA key management
ZigBee
Wireless fidelity (Wi-Fi)
requirements of
Wireless fundamentals
wireless medium
bandwidth
constraints
exposed terminal problem
hidden terminal problem
radio propagation effects
wireless networking basics
WLANs
Wireless gateway with Reef Edge Dolphin, implementing
Dolphin review
Dolphin, configuring
Dolphin, installing
user experience, improving
Wireless Local Area Networks (WLANs)
access points
advantages of
antennas
smart antennas
traditional fixed gain antennas
arrays
attacks
audit and discovery tools
AiroPeek NX
Kismet
MiniStumbler
NetStumbler
Sniffer Wireless
bluetooth and WPANs
current standards
disadvantages of
future standards
hardware
wireless network bridging
wireless printer servers
implementation concerns
capacity
performance
planning
power consumption
power over Ethernet
LANs
lightweight access point protocol
network access to
authentication weaknesses, exploiting
confidentiality weaknesses, exploiting
cryptographic weaknesses, exploiting
data integrity weaknesses, exploiting
MAC address spoofing and circumventing filters
rogue AP exploitation
WEP decryption tools
WLAN attacks
performance
security
anonymity in
authentication in
confidentiality in
data integrity in
establishment protocol of
loopholes in security
WPA
WPA2 (802.11i)
switches or controllers
ultra wideband
wireless network interface cards
working of
Wireless MAN devices
fixed wireless MAN antennas
fixed wireless MAN devices
mobile wireless MAN devices
wireless media access, 2nd
Wireless media access
Wireless medium
bandwidth
constraints
exposed terminal problem
hidden terminal problem
radio propagation effects
wireless network bridging
Wireless network bridging
wireless network interface cards, 2nd
Wireless network interface cards
Wireless network logical architecture
data link layer technologies
logical link control
MAC
network layer technologies
address resolution protocol
Internet Protocol Version
IP addressing
network address translation
port address translation
private IP addresses
routing
operating system considerations
OSI network model
physical layer technologies
wired networks
wireless networks
Wireless network physical architecture
wired network topologies
wireless MAN devices
fixed wireless MAN antennas
fixed wireless MAN devices
mobile wireless MAN devices
wireless network topologies
mesh networks
point-to-point connections
star topologies, in wireless networks
wireless PAN devices
hardware devices
wireless PAN antennas
WLAN devices
access points
antennas
arrays
hardware
lightweight access point protocol
switches or controllers
wireless network interface cards
wireless network, configuring, 2nd
wireless networks, 2nd
Wireless networks
802.11a protocol
802.11b protocol
802.11g protocol
configuring
encryption in
MAC in
next-generation protocols
physical layer technologies
restrict access to
security measures
antivirus software installation
encryption, in wireless network
home wireless network, securing
logs, reviewing
personal firewall installation
public wireless networks
restrict access, to wireless network
SSID, changing
wireless network, configuring
topologies in
mesh networks
point-to-point connections
star topologies
WLANs
wireless PAN antennas
Wireless Personal Area Networks (WPANs)
antennas
hardware devices
Bluetooth devices
ZigBee devices
Wireless policy essentials
Wireless position statement
wireless printer servers
Wireless printer servers
wireless protocol analyzers, 2nd
Wireless protocol analyzers
Wireless security implementation
D-Link DI-624 AirPlus 2.4 GHz Xtreme G wireless router with 4-port switch, enabling security features on
MAC address, filtering by
SSID broadcast, disabling
unique SSID, setting
WEP, enabling
fast track solutions
Linksys BEFW11 SR 802.11b access point/router, enabling security features on
MAC address, filtering by
SSID broadcast, disabling
unique SSID, setting
WEP, enabling
Linksys WAP11 802.11b access point, enabling security features on
MAC address, filtering by
SSID broadcast, disabling
unique SSID, setting
WEP, enabling
Linksys WRT54G 802.1 lb/g access point/router, enabling security features on
MAC address, filtering by
SSID broadcast, disabling
unique SSID, setting
WEP, enabling
wireless clients, configuring security features on
Linux clients, configuring
Windows 2000 clients, configuring
Windows XP clients, configuring
Wireless sensor networks
an introduction
applications of
civil structure monitoring
industrial automation
structural health monitoring–smart structures
architecture of
hybrid star and mesh network
mesh network
star network
future developments
power consideration in
radio options for physical layer
Bluetooth
IEEE 1451.5 standard
IEEE 802.11 standard
IEEE 802.15.4 standard
ZigBee
wireless sensor node architecture
wireless sensor node architecture
Wireless technologies
and future
cellular technologies
drowning, in acronyms
Wi-Fi
WPA
authentication
management
Wiretapping
wiretapping procedures, changes to
WLAN attacks, 2nd, 3rd
WLAN audit and discovery tools
WLANs, 2nd
working of
WPA
WPA authentication
WPA key management
WPA2 (802.11i)
authentication
confidentiality
establishment
integrity
Wrap-Up, 2nd
3.14.70.203