Index
[SYMBOL][A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]
W3C extended Log File Format WAN (wide area network) bandwidth, cost of war-driving and war-chalking warm site (disaster recovery plan) warning level of information sent to SYSLOG server warnings, Syslog weak passwords weaknesses [See also vulnerabilities[weaknesses:aaaSee]] internal and external of TCP/IP protocol suite[weaknesses:TCP/IP] Web applications web of trust web security hardening 2nd browsers 2nd case study 2nd file systems 2nd web servers 2nd SSL as standard forweb servers attacks against, prevention with signature-based IDS denial-of-service (DoS) attacks against hardening 2nd logging, enabling restricting access to a website 2nd securing, tasks involved in web-based requests (PKI enrollment)website restricting access to website certificateswebsites information on network security 2nd SSL-enabled Well Known Ports WEP (wired equivalent privacy) protocol 2nd counterneasures to vulnerabilities overview of vulnerabilities of WEPCrack program wheel cipher Windows Internet Naming Service (WINS)Windows systems file systems, hardening 2nd integrated authenticationwired equivalent privacy
[See WEP protocol]wireless how it works standards for WLAN applicationswireless and voice communication over IP government role in securitywireless local-area networks
[See WLANs] wireless network interface cards (NICs)wireless networks building-to-building, types of community networks wireless security 2nd 3rd adding wireless to secure network 2nd SAFE WLAN design war-driving and war-chalking Wireless Security Suite, Cisco 2nd WLANs (wireless LANs) different configurations of EAP protocol and 802.11i standard hotspot how wireless works overview of peer-to-peer risks of open wireless ports SAFE WLAN design setting up WLAN connection worms