Network Security Fundamentals [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network Security Fundamentals [Electronic resources] - نسخه متنی

Gert De Laet, Gert Schauwers

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

Index

[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]

e-business

necessity of network security for

e-commerce

e-mail

protection during transmission with PC encryption cards

social engineering attacks, use in

EAP (Extensible Authentication Protocol)

eavesdropping (sniffing) on publicly accessible networks

echo and Echo-Reply messages

echo messages to IP broadcast addresses

economic constraints, network design

EDE (encrypt-decrypt-encrypt)

Electronic Communications Privacy Act (EPCA)

email attacks

enable secret command 2nd

encapsulating security payload
[See ESP protocol]

encrypt-decrypt-encrypt (EDE) method

encrypted logins

Kerberos

SSH (Secure Shell)

encryption 2nd

Diffie-Hellman key exchange

ESP (encapsulating security payload) protocol

file

PC encryption cards

public/private keys, digital IDs

RSA-encrypted nonces 2nd

SEP (Scalable Encryption Processing)

symmetric key algorithms 2nd

AES

DES

Triple DES (3DES)

WEP, improvement with TKIP

wired equivalent privacy (WEP) keys

encryption algorithms

Advanced Encryption Standard (AES)

DES and 3DES

establishing in IPSec policy

identified in IPSec transform sets

identifying for ESP in IKE Phase 2

identifying for IKE Phase 1

encryption file system (EFS)

end stations, wireless
[See stations, wireless]

enforcement section, security policies

example VPN security policy

enhanced access lists 2nd

Enigma machine

enrolllment procedure, PKI

Enterprise Composite Network Model

out-of-band IDS management

environmental monitoring, high-level security areas

environmental requirements for network equipment 2nd

EPCA (Electronic Communications Privacy Act)

equipment failure, risk of

errors

detection in data streams

ESP (encapsulating security payload) protocol

establishing use of in IPSec policy

identified in IPSec transform sets

identifying for IKE Phase 2

transport mode

tunnel mode

Ethereal tool

Ethernet

crossover cables

NetScreen firewalls and

speed, possible values for

to wireless bridge[Ethernet:wireless]

WLANs, 802.3 IEEE standard

eToken

evaluate command

evasion techniques for network IDSs

events and alarms (RMON), monitoring traffic with

exclusive OR (XOR) function

exec-timeout, setting

Explicit Congestion Notification (ECN)

extended access lists

reflexive

extended IP acccess lists

extended Log File Format, W3C

extended numbered access lists 2nd

extended service set (ESS)

Extensible Authentication Protocol (EAP)

external interface of the firewall

external physical security

external physical security, options for

external weaknesses

/ 196