Network Security Fundamentals [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network Security Fundamentals [Electronic resources] - نسخه متنی

Gert De Laet, Gert Schauwers

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

Index

[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]

W3C extended Log File Format

WAN (wide area network) bandwidth, cost of

war-driving and war-chalking

warm site (disaster recovery plan)

warning level of information sent to SYSLOG server

warnings, Syslog

weak passwords

weaknesses [See also vulnerabilities[weaknesses:aaaSee]]

internal and external

of TCP/IP protocol suite[weaknesses:TCP/IP]

Web applications

web of trust

web security

hardening 2nd

browsers 2nd

case study 2nd

file systems 2nd

web servers 2nd

SSL as standard for

web servers

attacks against, prevention with signature-based IDS

denial-of-service (DoS) attacks against

hardening 2nd

logging, enabling

restricting access to a website 2nd

securing, tasks involved in

web-based requests (PKI enrollment)

website

restricting access to

website certificates

websites

information on network security 2nd

SSL-enabled

Well Known Ports

WEP (wired equivalent privacy) protocol 2nd

counterneasures to vulnerabilities

overview of

vulnerabilities of

WEPCrack program

wheel cipher

Windows Internet Naming Service (WINS)

Windows systems

file systems, hardening 2nd

integrated authentication

wired equivalent privacy
[See WEP protocol]

wireless

how it works

standards for WLAN applications

wireless and voice communication over IP

government role in security

wireless local-area networks
[See WLANs]

wireless network interface cards (NICs)

wireless networks

building-to-building, types of

community networks

wireless security 2nd 3rd

adding wireless to secure network 2nd

SAFE WLAN design

war-driving and war-chalking

Wireless Security Suite, Cisco 2nd

WLANs (wireless LANs)

different configurations of

EAP protocol and 802.11i standard

hotspot

how wireless works

overview of

peer-to-peer

risks of open wireless ports

SAFE WLAN design

setting up WLAN connection

worms


/ 196