Network Security Fundamentals [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network Security Fundamentals [Electronic resources] - نسخه متنی

Gert De Laet, Gert Schauwers

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

Index

[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]

MAC (medium access control) layer, WLANs

security enhancements, IEEE 802,11i standard

mail server, atttack on rebuffed by network IDS

malware

definition and categories of

man in the middle attacks

man-in-the-middle attacks

WEP protocol, vulnerability to

Management Information Base
[See MIB]

management station, network IDS

management, IDS

manager functions, VPN

managers, SNMP

defining relationship with agent

limiting access to objects

mangement station, IDS

communication with sensors

manpower and labor costs

for IDSs[manpower and labor costs:IDSs]

masks

router access lists

McAfee Antivirus software applications

MD5 encryption algorithm

enable secret password hashes

MD5 or SHA-1 hash algorithms

establishing use of in IPSec policy

identifying for IKE Phase 2

IKE Phase 1, using with

medium access control
[See MAC layer, WLANs]

memory

tied up in TCP SYN flood attacks

message digest (MD5)

Message Digest 5 (MD5) algorithm

message injection attacks

message modification attacks

MIB (Management Information Base)

Microsoft

hardening IIS, website information on

Internet Explorer
[See Internet Explorer]

security information on the website

Microsoft operating systems

security patches and updates for programs used on

URL for security patches and critical updates

misuse, risk of

mobile IP

modular approach to network security

monitoring network

monitoring port, network IDS

multicasting

testing in network traffic simulation

multiple locations for network defenses

/ 196