Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Vladimirov A.A., Gavrilenko K.V., Mikhailovsky A.A. — Wi-Foo
Vladimirov A.A., Gavrilenko K.V., Mikhailovsky A.A. — Wi-Foo



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Wi-Foo

Авторы: Vladimirov A.A., Gavrilenko K.V., Mikhailovsky A.A.

Аннотация:

The definitive guide to penetrating and defending wireless networks. Straight from the field, this is the definitive guide to hacking wireless networks. Authored by world-renowned wireless security auditors, this hands-on, practical guide covers everything you need to attack — or protect — any wireless network. The authors introduce the 'battlefield,' exposing today's 'wide open' 802.11 wireless networks and their attackers. One step at a time, you'll master the attacker's entire arsenal of hardware and software tools: crucial knowledge for crackers and auditors alike. Next, you'll learn systematic countermeasures for building hardened wireless 'citadels''including cryptography-based techniques, authentication, wireless VPNs, intrusion detection, and more.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2004

Количество страниц: 592

Добавлена в каталог: 18.05.2005

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Perlskan      
personal area networks (PANs)      2nd
pGina      2nd 3rd 4th
Physical layer      
Physical Layer, attacks      2nd 3rd
Physical Layer, security      2nd 3rd 4th 5th
Pluggable Authentication Module (PAM)      2nd 3rd
PocketWarrior      
Point-to-Point Tunneling Protocol (PPTP)      2nd 3rd
pop      
port scanning      
Power calculations      2nd 3rd 4th
Power-saving mode attacks      
Preshard key (PSK)      2nd 3rd 4th
prism      
Prism, based cards      2nd
Prism, chipset      2nd 3rd 4th 5th 6th 7th
Prism, monitor headers      2nd 3rd 4th
Prism2ctl      2nd
Prism2dump      2nd
Prismdump      2nd
Prismsnort      
Property rule      2nd
Protocol filtering, bypassing      2nd 3rd
Pseudo-random generators (PRNGs)      2nd
Public key algorithm      
QA Cafe      
RADIUS (Remote Authentication Dial-In User Service)      2nd 3rd
RADIUS, AAA framework      2nd
RADIUS, accounting      2nd
RADIUS, attribute types      
RADIUS, features of      2nd
RADIUS, freeRADIUS, installing and configuring      2nd 3rd 4th 5th 6th 7th
RADIUS, freeRADIUS, integration      2nd 3rd
RADIUS, overview of      2nd
RADIUS, packet codes      
RADIUS, packet formats      2nd
RADIUS, packet types      2nd
RADIUS, related tools      2nd
RADIUS, vulnerabilities      2nd 3rd
RadiusContext      
RadiusReport      
RadiusSplit      
Rager, Anton T      2nd
rathergood.com      
Raw frame sniffing mode      2nd 3rd 4th
RC      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
Reachability      
Realtek RTL8180L      
Redfang      
Regulation of Investigatory Powers (RIP) Bill      
reinj      2nd 3rd
Remote Access Server (RAS)      
RF
RF monitor (RFMON)      2nd 3rd
RF, amplifiers      2nd
RF, antennas      2nd 3rd 4th
RF, cables and connectors      2nd
RF, jamming      
RF, power calculations      2nd 3rd 4th
RF, signal strength monitoring tools      2nd 3rd
RFGrabber      
Rijmen, Vincent      
Rijndael      2nd 3rd 4th
RIPEMD      2nd
RIPv      2nd
Rivest, Ronald      2nd
Rogue access point deployment      2nd 3rd 4th 5th 6th 7th 8th
ROT      2nd 3rd
Routing protocol, analysis of      
Routing updates, injecting      2nd
RSA (Rivest, Shamir, Adleman) encryption method      2nd
RSA Data Security, Inc      2nd 3rd 4th
RSA Signature Scheme      2nd
RTS/CTS      2nd 3rd
SAFE      2nd
Satan/Saint/Sara      
Savard, John      2nd 3rd
Scanchan      
Scanning      2nd 3rd 4th
Schiffman, Mike      2nd
Schneier, Bruce      
Schneier, Bruce, Blowfish      2nd 3rd
Schneier, Bruce, Twofish      2nd 3rd 4th
Search, conducting an extensive      2nd 3rd
Secure Digital (SD) cards      
Secure message format      
Security      2nd [See Cryptography]
security associations (SAs)      2nd
Security, 802.11i standard      2nd 3rd 4th 5th 6th 7th 8th 9th
Security, access point deployment and positioning      
Security, audits      
Security, Bell-LaPadula model of security systems      
Security, Biba model of security systems      2nd
Security, closed ESSIDs      2nd
Security, countermeasures      
Security, gateway      2nd 3rd 4th 5th 6th 7th
Security, MAC filtering      
Security, monitoring and incident response      2nd
Security, Physical Layer      2nd 3rd 4th 5th
Security, proprietary improvements      2nd 3rd
security, RADIUS      2nd
Security, SSH port forwarding      2nd
Security, updates and registrations      
Security, user education and responsibility      2nd
security, VLANs      2nd 3rd 4th 5th
Self-synchronization      
SELinux      
Senao Long Range      
Sensor construction      2nd 3rd 4th 5th
Sentinel      2nd 3rd 4th 5th
Serpent      2nd 3rd 4th 5th 6th 7th
Serpent, SHA,hash (one-way) functions      2nd 3rd
Shamir, Adi      2nd 3rd
Shannon, Claude      
Sharp Zaurus      2nd 3rd
Shmoo Group      2nd
Signal loss, obstacle types and      
Signal strength      
Signal strength, limiting      2nd
Signal strength, monitoring tools      2nd 3rd
Simple Authentication and Security Layer (SASL)      2nd
Simple security rule      
Sing      
Siphon      
Site surveying      2nd
Site surveying, issues      2nd 3rd 4th
slapd      
Sleepycat Software Berkeley DBv      2nd
smbproxy      
Smoorenburg, Miquel van      
Sniffdet      2nd
Sniffer Wireless      
Sniffers, detecting      2nd 3rd
SNMP      
snmpget      
snmpset      
snmpwalk      
SNR      2nd
Soekris boards      
Song, Dug      
SourceForge      2nd
Spam      2nd
Spitzner, Lance      
Spoofed deassociation and deauthentication frames floods      2nd
Spoofed malformed authentication frame      2nd
SSH      2nd 3rd
SSH, port forwarding      2nd
sshmitm      2nd
sshow      
SSHv      2nd
SSIDs, default      2nd 3rd 4th
Ssidsniff      
ST-divine      
Star VPN      
Stealth levels while penetration testing      2nd
Steganography      2nd
Steghide      
Stegtunnel      
Streaming algorithms      2nd 3rd
Super Sniffer      
Supplicants      
Supplicants, Linux      2nd 3rd
Supplicants, Windows 2000 and Windows XP      2nd 3rd 4th
Surfing      
sw-mitm      
Symbol chipset      2nd
Symmetric block cipher      
SYN ACK Labs      
Synchronous stream cipher      
Syslog      
Taranis      
TCP wrappers      
Team Teso      
Texas Instruments chipsets      
THCrut      2nd
Tiger      
TKIP (Temporal Key Integrity Protocol)      2nd 3rd 4th 5th 6th
Traffic indication map (TIM) frame attacks      
Traffic injection tools      2nd 3rd 4th 5th 6th 7th 8th 9th
Traffic, analyzing network      2nd 3rd 4th 5th 6th
Transport layer security, OpenLDAP      
Trapdoof      
traps      
Tripwire      2nd
Truth tables      
Tunneling protocols      2nd 3rd
Twofish      2nd 3rd 4th 5th 6th 7th 8th 9th
user authentication      [See Security;RADIUS]
Vagner Sacramento      
Virtual carrier sense-implementing network attacks      
Virtual private networks      [See Attacking;VPNs]
Virtual Router Resilience Protocol (VRRP)      2nd
VLANs, security and      2nd 3rd 4th 5th
Voice over IP (VOIP)      2nd
void      2nd 3rd 4th 5th 6th
vomit      2nd
VPNs (Virtual Private Networks)      
VPNs, attacking      2nd 3rd 4th 5th 6th 7th
VPNs, clPe      
VPNs, Open      2nd
VPNs, purpose of      2nd 3rd
VPNs, reasons for deploying      2nd
VPNs, topologies      2nd 3rd 4th 5th 6th 7th 8th 9th
VPNs, tunneling protocols and common      2nd 3rd
VPNs, Vtun      
Vtun      
warchalking      2nd
Warchalking, signs      2nd
Warclimbing      2nd
Warcycling      2nd
wardialing      
Wardrive      2nd 3rd
wardriving      
Warwalking      2nd
Watts, converting decibels to      2nd 3rd
Wavemon      
Wavesec      
Wavestumbler      2nd
Webmitm      
websites      
Websites, for network footprinting      2nd 3rd
Websites, for power calculations      
webspy      
Wellenreiter      2nd 3rd 4th 5th 6th
WEP      2nd 3rd
WEP crackers      
WEP crackers, AirSnort      
WEP crackers, Dweputils      2nd
WEP crackers, WepAttack      2nd
WEP crackers, Wepcrack      2nd 3rd
WEP crackers, Wep_tools      2nd 3rd 4th
WEP cracking      
WEP cracking, brute-force      2nd
WEP cracking, field observations in      2nd
WEP cracking, traffic injection tools to accelerate      2nd 3rd
WEP, key length      2nd
WEP, proprietary improvements      2nd 3rd
WEP, tool for retrieving keys stored on client hosts      
WepAttack      2nd
Wepcrack      2nd 3rd
Wepwedgie      2nd 3rd 4th 5th 6th
Wep_tools      2nd 3rd 4th
Whitening      2nd
Whiting, Doug      
Wi-Fi Alliance      
wicontrol      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Wide area networks (WANs)      
wIDS      2nd
WIDZ      2nd
WifiScanner      2nd
WildPackets, AiroPeek      2nd 3rd
Windows      
Windows XP      
Windows XP, probing      
Windows XP, scanning service      2nd
Windows XP, supplicants      2nd 3rd 4th
Windows, client setup      2nd 3rd 4th 5th 6th
Windows, IPSec client configuration      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
Windows, supplicants      2nd 3rd 4th
Windows, tools for      2nd
Wired systems, attacking      2nd 3rd 4th 5th 6th
Wireless Access Point Utilities for UNIX      
wireless hackers      
Wireless hackers, targets of      2nd 3rd 4th
Wireless hackers, who are      2nd 3rd
Wireless hacking, reasons for      2nd 3rd 4th
Wireless Network Meter      
Wireless Power Meter (wpm)      
Wireless Protected Access (WPA)      2nd 3rd 4th 5th 6th 7th
WiSentry      
Wistumbler      2nd
wlan-scan      
wlancfg      2nd
wlanctl-ng      2nd 3rd
WlanFE      
wlanmeter      
wlansniff      
wlan_jack      2nd
Wnet      2nd
Wright, Joshua      2nd 3rd 4th 5th 6th 7th 8th
X.509 certificate generation      2nd
XORing      2nd
Xtops      
XtRADIUS      
xwconfig      
YALA      
YARD RADIUS      
YellowJacket and YellowJacket Plus      
Zcomax XI-325HP      
ZoomAir access points      
1 2 3
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте