default search action
Encyclopedia of Information Assurance 2011
- Rebecca Herold:
Encyclopedia of Information Assurance. Taylor & Francis 2011, ISBN 1-4200-6620-X
A
- Stanley A. Kurzban:
Access Controls: Implementation. - Alex Golod:
Access Controls: PKI-Based. - Dean Bushmiller:
Accountability. - Robby Fussell:
Adaptable Protocol Framework. - Ben Rothke:
Advanced Encryption Standard (AES). - Al Berg:
Applets: Network Security. - Keith Pasley:
Application Layer Security. - William Stackpole:
Application Layer Security: Network Protocols. - Walter S. Kobus Jr.:
Application Security. - Sean Scanlon:
Application Security: World Wide Web. - Andres Llana Jr.:
Application Service Providers: Information Assurance Considerations. - Stephen D. Fried:
Application Service Providers: Secure Relationships. - Lowell Bruce McCulley:
Application Systems Development. - David C. Rice, Graham Bucholz:
Applications: Auditing. - Kenneth J. Knapp, R. Franklin Morris Jr.:
Architecture: Biological Cells. - Chris Hare:
Architecture: Firewalls. - Foster J. Henderson, Kellina M. Craig-Henderson:
Architecture: Models. - Christopher A. Pilewski, Bonnie A. Goins Pilewski:
Architecture: Secure. - Bryan D. Fish:
Artificial Intelligence (AI): Intrusion Analysis. - Mansour Sheikhan:
Artificial Neural Network Models for Intrusion Detection. - Steven F. Blanding:
Asynchronous Transfer Mode (ATM): Integrity and Security. - Stephen James:
Auditing: Self-Hacking. - Maria Schuett:
Authentication Methods. - Susan D. Hansche:
Awareness and Training. - Susan D. Hansche:
Awareness and Training: Appendices. - Timothy R. Stacey:
Awareness and Training: Briefing for the End User. - Rebecca Herold:
Awareness and Training: Effective Methods. - Charles R. Hudson Jr.:
Awareness and Training: Framework. - Samuel W. Chun:
Awareness and Training: Motivational and Psychological Factors. - Thomas R. Peltier:
Awareness and Training: Program Elements.
B
- Edward H. Freeman:
Bally v. Faber. - Donald R. Richards:
Biometrics: Identification. - Judith M. Myerson:
Biometrics: New Methods. - Mano Paul:
Bluesnarfing. - James Trulove:
Broadband Internet Access. - Sean M. Price:
Buffer Overflows: Attacks. - Jonathan Held:
Buffer Overflows: Stack-Based. - Ken Doughty:
Business Continuity Management: Maintenance Processes. - Carl B. Jackson:
Business Continuity Management: Metrics. - Kevin Henry:
Business Continuity Management: Priorities. - James S. Mitts:
Business Continuity Management: Testing. - Carl B. Jackson:
Business Continuity Management: Testing, Maintenance, Training, and Awareness. - Ken M. Shaurette, Thomas J. Schleppenbach:
Business Continuity Planning. - Timothy R. Stacey:
Business Continuity Planning: Best Practices and Program Maturity. - Kevin Henry:
Business Continuity Planning: Case Study. - Kevin Henry:
Business Continuity Planning: Collaborative Approach. - Steven P. Craig:
Business Continuity Planning: Distributed Environment. - Carl B. Jackson:
Business Continuity Planning: Enterprise Risk Management Structure. - Carl B. Jackson:
Business Continuity Planning: Evolution in Response to Major News Events. - Carl B. Jackson:
Business Continuity Planning: Process Reengineering. - John Dorf, Martin Johnson:
Business Continuity Planning: Restoration Component. - Ken Doughty:
Business Continuity Planning: Strategy Selection. - Carl B. Jackson:
Business Impact Analysis: Business Process Mapping. - Carl B. Jackson:
Business Impact Analysis: Process. - Jeff Misrahi:
Business Partnerships: Validation.
C
- Matt Nelson:
Capability Maturity Model. - Micki Krause:
Career Management. - William Stackpole:
Centralized Authentication Services. - Mollie E. Krehnke, David C. Krehnke:
Certification and Accreditation: Methodology. - Kevin J. Davidson:
Certification Testing. - Mansour Sheikhan:
Chaotic-Based Communication Systems. - Mignona Cote:
Committee of Sponsoring Organizations (COSO). - Ben Rothke:
Common Criteria. - Debra S. Herrmann:
Common Criteria: IT Security Evaluation. - William Hugh Murray:
Communication Protocols and Services. - Todd Fitzgerald:
Compliance Assurance. - Donn B. Parker:
Computer Abuse. - Christopher A. Pilewski:
Computer Crime. - George Wade:
Computer Crime: Investigations. - Leighton Johnson III:
Configuration Management. - Mollie E. Krehnke, David C. Krehnke:
Configuration Management: Process Stages. - Chris Hare:
Controls: CISSP and Common Body of Knowledge (CBK). - William T. Harding, Anita J. Reed, Robert L. Gray:
Cookies and Web Bugs. - David C. Krehnke:
Corporate Governance. - Jeffrey Davis:
Corporate Security: IT Organization. - Anton Chuvakin:
Covert Channels. - Ralph Spencer Poore:
Covert Channels: Analysis and Recommendations. - Mollie E. Krehnke:
Crime Prevention: Environmental Design. - Bonnie A. Goins Pilewski:
Critical Business Functions. - Jonathan Held:
Cross-Site Scripting (XSS). - Praveen Gauravaram, Lars R. Knudsen:
Cryptographic Hash Functions. - Javek Ikbal:
Cryptography. - Steve Stanek:
Cryptography: Auditing. - Joost Houwen:
Cryptography: Cryptosystems. - Paul Lambert:
Cryptography: Elliptic Curve. - Ronald A. Gove:
Cryptography: Encryption and. - William Hugh Murray:
Cryptography: Key Management: Functions and Principles. - Ralph Spencer Poore:
Cryptography: Key Management: History and Myths. - Ben Rothke:
Cryptography: Quantum. - Ralph Spencer Poore:
Cryptography: Transitions. - Chris Hare:
Customer Relationship Management (CRM). - Ed Gabrys:
Cybercrime: Council of Europe. - Thomas Akin:
Cybercrime: Response, Investigation, and Prosecution. - Carol A. Siegel, Ty R. Sagalow, Paul Serritella:
Cyber-Risk Management: Enterprise-Level Security.
D
- Mollie E. Krehnke, David C. Krehnke:
Data Access Controls: Sensitive or Critical. - Samuel W. Chun, Leo Kahng:
Data at Rest. - John R. Vacca:
Data Centers: Security. - Sandy Bacik:
Data Centers: Site Selection and Facility Design. - Jonathan Held:
Data Sanitization: SQL Injection. - Mollie E. Krehnke, D. K. Bradley:
Data Warehouses: Datamarts and. - David Bonewell, Karen Gibbs, Adriaan Veldhuisen:
Data Warehouses: Security and Privacy. - William Hugh Murray:
Database Integrity. - Jeffrey Davis:
Defense in Depth: Network, Systems, and Applications Controls. - K. Narayanaswamy:
Denial-of-Service Attacks. - Marcus Rogers:
Digital Crime Scene Analysis (DCSA). - Larry R. Leibrock:
Digital Forensics and E-Discovery. - Ken Buszta:
Directory Security. - Sasan Hamidi:
Distributed Computing: Grid Environment. - Robert B. Batie Jr.:
DoD Information Assurance Certification and Accreditation Process (DIACAP). - Mark Bell:
Domain Name Service (DNS) Attacks. - Thomas J. Bray:
Downsizing: Maintaining Information Security. - Robert Braun, Stan Stahl:
Due Care: Minimum Security Standards.
E
- Chris Hare:
Electronic Commerce: Auditing. - Leo A. Wrobel:
E-Mail and Data Communications: Dial-In Hazards. - William Stallings:
E-Mail: Pretty Good Privacy. - Stephen D. Fried:
E-Mail Retention Policy: Legal Requirements. - Bruce A. Lobree:
E-Mail: Security. - Al Bredenberg:
E-Mail: Spam. - Bryan T. Koch:
Enclaves: Enterprise as Extranet. - Franjo Majstor, Guy Vancollie:
Encryption Key Management. - Franjo Majstor:
End Node Security and Network Access Management. - Bonnie A. Goins Pilewski:
Enterprise Information Assurance: Framework. - Duane E. Sharp:
Enterprise Information Assurance: Key Components. - Mollie E. Krehnke, David C. Krehnke:
Enterprise Information Security: Architectural Design and Deployment. - Matthew J. Decker:
Enterprise Security Capability: Common Models. - Matunda Nyanchama, Anna Wilson:
Enterprise Security Information. - Craig A. Schiller:
Espionage: Counter-Economic. - Peter S. Tippett:
Ethics. - Micki Krause:
Ethics: Internet. - Glenn Cater:
Event Management. - Steven F. Blanding:
External Networks: Secured Connections. - Christopher King:
Extranet Access Control.
F
- Ben Rothke:
Fax Machines. - Paul A. Henry:
Firewall Architectures. - Paul A. Henry:
Firewall Architectures: Other Issues. - Paul A. Henry:
Firewall Architectures: Platforms. - Paul A. Henry:
Firewall Architectures: Viruses and Worms. - Per Thorsheim:
Firewall Technologies: Comparison. - Ben Rothke:
Firewalls: Checkpoint Security Review. - E. Eugene Schultz:
Firewalls: Internet Security. - Kelly J. Kuchta:
Forensics. - Thomas Welch:
Forensics and Legal Proceedings. - Thomas Welch:
Forensics: Computer Crime Investigation. - Carol Stucki:
Forensics: Non-Liturgical Examinations. - Michael J. Corby:
Forensics: Operational. - Thomas Welch:
Forensics: Rules of Evidence. - Mano Paul:
Format String Vulnerabilities. - Rebecca Herold:
Fraud: Employee Identification. - Chris Hare:
FTP: Secured Data Transfers. - Mansour Sheikhan:
Fuzzy Models for Intrusion Detection.
G
- Ralph Spencer Poore:
Global Transmissions: Jurisdictional Issues. - Glossary.
H
- Ed Skoudis:
Hackers: Attacks and Defenses. - Ed Skoudis:
Hackers: Hiring Ex-Criminal. - Ed Skoudis:
Hackers: Tools and Techniques. - Chris Hare:
Halon Fire Suppression Systems. - Keith Pasley:
Hash Algorithms. - Lynda L. McGhie:
Health Insurance Portability and Accountability Act (HIPAA). - Todd Fitzgerald:
Health Insurance Portability and Accountability Act (HIPAA): Requirements. - David MacLeod, Brian T. Geffert, David Deckter:
Health Insurance Portability and Accountability Act (HIPAA): Security Readiness. - Brian T. Geffert:
Health Insurance Portability and Accountability Act (HIPAA): Security Requirements. - Micki Krause:
Healthcare Industry. - William C. Boni:
High-Tech Trade Secrets. - Anton Chuvakin:
Honeypots and Honeynets. - Jeffery J. Lowder:
Host-Based Firewalls: Case Study. - Jeffrey H. Fenton, James M. Wolfe:
Human Resources: Issues.
I
- Lynda L. McGhie:
Identity Management. - Kevin Castellow:
Identity Management Systems: Components. - James S. Tiller:
Identity Theft. - Samuel W. Chun:
Identity-Based Self-Defending Network: 5W Network. - Marcus Rogers:
Incident Response: Evidence Handling. - Ken M. Shaurette, Thomas J. Schleppenbach:
Incident Response: Exercises. - Alan B. Sterneckert:
Incident Response: Management. - Michael Vangelos:
Incident Response: Managing. - Rebecca Herold:
Incident Response: Privacy Breaches. - Jim Appleyard:
Information Classification. - Sean M. Price:
Information Flow. - Sean M. Price:
Information Flow: Emerging and Potential Techniques and Covert Channels. - Sean M. Price:
Information Flow: Selecting Countermeasures. - Rebecca Herold:
Information Protection. - Ken M. Shaurette:
Information Security Basics: Effective Practices. - Harold F. Tipton:
Information Security Controls: Types. - Ralph Spencer Poore:
Information Security Governance: Basic Corporate Organization. - Todd Fitzgerald:
Information Security Governance: Corporate Organization, Frameworks, and Reporting. - Harold F. Tipton:
Information Security Management: Purpose. - Tom Carlson:
Information Security Management Systems (ISMSs). - Nick Halvorson:
Information Security Management Systems (ISMSs): Risk Diagnosis and Treatment. - Brian Shorten:
Information Security Policies. - Robert B. Batie Jr.:
Information Systems Security Engineering Professional (ISSEP). - Carl Burney:
Information Systems Security Officer: Roles and Responsibilities. - David McPhee:
Information Technology Infrastructure Library (ITIL®). - Gerald L. Kovacich:
Information Warfare. - Gerald L. Kovacich, Andy Jones, Perry G. Luzwick:
Information Warfare: Tactics. - Todd Fitzgerald:
Insider Threats. - Sean M. Price:
Insider Threats: System and Application Weaknesses. - Anderson Ramos:
Inspection Technologies: Deep Packets. - William Hugh Murray:
Instant Messaging. - George G. McBride:
Integrated Threat Management. - Robby Fussell:
Intelligent Agents: Network Security. - Michael Losavio, Adel Elmaghraby, Deborah W. Keeling:
International Issues. - Ron Moritz:
Internet Mobile Code. - Douglas G. Conorich:
Internet Security. - Lee Imrey:
Internet Service Providers (ISPs): Accountability. - Ralph L. Kliem:
Intranets: Risk. - Ken M. Shaurette:
Intrusion Detection Systems (IDSs). - E. Eugene Schultz, Eugene H. Spafford:
Intrusion Detection Systems (IDSs): Implementation. - Gildas A. Deograt-Lumy, Ray Haldo:
Intrusion Prevention Systems. - William Stackpole:
IP Security Protocol Working Group (IPSec). - Gilbert Held:
IPv6: Expanding Internet Support. - Scott Erkonen:
ISO Standards and Certification. - Mollie E. Krehnke:
IT Governance Institute (ITGI).
J
- Ben Rothke:
Java.
K
- Joe Kovara, Ray Kaplan:
Kerberos™. - Joe Kovara, Ray Kaplan:
Kerberos™: Management. - Joe Kovara, Ray Kaplan:
Kerberos™: Ongoing Development. - Joe Kovara, Ray Kaplan:
Kerberos™: Services and Functions.
L
- Steven F. Blanding:
LAN/WAN Security. - Faith M. Heikkila:
Laws and Regulations: e-Discovery.
M
- Ralph Hoefelmeyer, Theresa E. Phillips:
Malicious Code. - Paul A. Henry:
Malicious Code: Fast-Scanning Worms. - Michael Pike:
Malicious Code: Organized Crime. - Craig A. Schiller:
Malicious Code: Quasi-Intelligence. - E. Eugene Schultz:
Malicious Code: Rootkits. - James S. Tiller:
Managed Security Service Providers (MSSPs). - William Tompkins:
Management Commitment. - Todd Fitzgerald:
Management Commitment: Security Councils. - Sanford Sherizen:
Management Compliance: Confidential Information. - Kenneth J. Knapp, Thomas E. Marshall:
Management Support of IT: Survey. - Mano Paul:
Mashups and Composite Applications. - Craig A. Schiller:
Mergers and Acquisitions. - Ralph Spencer Poore:
Message Digests. - George G. McBride:
Mobile Data Security.
N
- Bonnie A. Goins Pilewski, Christopher A. Pilewski:
NERC Corporation: Compliance. - Samuel W. Chun:
Network and Telecommunications: Media. - Georges J. Jahchan:
Network Content Filtering and Leak Prevention. - Steven F. Blanding:
Network Layer Security. - Steven F. Blanding:
Network Router Security. - Bonnie A. Goins Pilewski, Christopher A. Pilewski:
Network Security. - Jeff Flynn:
Network Security: Trapping Intruders. - Chris Hare:
Network Technologies. - Sean M. Price:
Neural Networks and Information Assurance Uses. - Robby Fussell:
Next-Generation Security Application Development.
O
- Polly Perryman Kuver:
Object-Based Applications: Testing. - James Cannady:
Object-Oriented Databases: Security Models. - Louis B. Fried:
Object-Oriented Programming. - Stephen D. Fried:
Offshore Development. - Ed Skoudis:
Open Source. - David O'Berry:
Open Standards. - Michael Pike:
Operations Security: Abuses. - Patricia A. P. Fisher:
Operations Security: Controls. - Kevin Henry:
Operations Security: Support and Control. - Don Saracco:
Organization Culture. - Michael J. Corby:
Outsourcing. - William Hugh Murray:
Ownership and Custody of Data.
P
- Steve A. Rodgers:
Packet Sniffers. - Daniel D. Houser:
Passwords and Policy Threat Analysis. - Lynda L. McGhie:
Patch Management. - Felicia M. Nicastro:
Patch Management: Process. - William A. Yarberry Jr.:
PBX Firewalls. - Chuck Bianco:
Penetration Testing. - Stephen D. Fried:
Penetration Testing: Policies. - Satnam Purewal:
PeopleSoft Security. - R. Scott McCoy:
Perimeter Security. - John O. Wylder:
Personal Accountability: Corporate Information Security Policy. - Edward H. Freeman:
Personnel: Practices. - Kevin Henry:
Personnel: Security Roles. - Ben Rothke:
Personnel: Security Screening. - Todd Fitzgerald:
Phishing. - Dan M. Bowers:
Physical Access Control. - Matthew J. Decker:
Physical Layer Security: Networks. - James Trulove:
Physical Layer Security: Wired and Wireless Connections. - Christopher Steinke:
Physical Security. - Bruce R. Matthews:
Physical Security: Controlled Access and Layered Defense. - Alan Brusewitz:
Physical Security: Facilities. - R. Scott McCoy:
Physical Security: Mantraps and Turnstiles. - Kevin Henry:
Physical Security: Melding with Information Systems Security. - Gerald Bowman:
Physical Security: Mission-Critical Facilities and Data Centers. - Jaymes Williams:
Physical Security: Threat after September 11th, 2001. - Samantha Thomas:
Planning for the Future: Challenges. - Ben Rothke:
Pod Slurping: Concepts. - Kenneth F. Belva:
Pod-Slurping: Other Vulnerabilities. - Chris Hare:
Policy Development: Needs. - Phillip Q. Maier:
Portable Computing Environments. - Rebecca Herold:
Privacy Breaches: Policies, Procedures, and Notification. - Rebecca Herold:
Privacy Governance: Effective Methods. - Kate Borten:
Privacy: Healthcare Industry. - Edward H. Freeman:
Privacy: Legal Issues. - Michael J. Corby:
Privacy: Policy Formation. - Micah Silverman:
Proxy Servers. - Geoffrey C. Grabow:
Public Key Hierarchy. - Harry B. DeMaio:
Public Key Infrastructure (PKI). - Douglas C. Merrill, Eran Feigenbaum:
Public Key Infrastructure (PKI): E-Business. - Alex Golod:
Public Key Infrastructure (PKI): Registration.
Q
- Robby Fussell:
Quantum Computing.
R
- Ben Rothke:
Radio Frequency Identification (RFID). - Chris Hare:
RADIUS: Access Control. - Maria Schuett:
Reduced Sign-On. - Tyson Heyn:
Redundant Arrays of Independent Disks (RAID). - Ravi S. Sandhu:
Relational Database Access Controls: SQL. - Ravi S. Sandhu, Sushil Jojodia:
Relational Database Security. - Christina M. Bird:
Remote Access: Secure. - Carl F. Endorf:
Return on Investment (ROI). - Will Ozier:
Risk Analysis and Assessment: Risk Assessment Tasks. - Will Ozier:
Risk Analysis and Assessment: Risk Management Tasks. - Will Ozier:
Risk Analysis and Assessment: Terms and Definitions. - Samantha Thomas:
Risk Assessment. - Ron Woerner:
Risk Management. - Kevin Henry:
Risk Management and Analysis. - Carl B. Jackson, Mark Carey:
Risk Management: Enterprise. - Ken M. Shaurette:
Risk Management Model: Technology Convergence. - Brett Regan Young:
Risk Management: Trends. - Ian Clark:
Role-Based Access Control.
S
- Ken M. Shaurette:
Sarbanes-Oxley Act of 2002 (SOX). - Bonnie A. Goins Pilewski:
Sarbanes-Oxley Act of 2002 (SOX): Compliance. - Chris Hare:
Secure Socket Layer (SSL). - James S. Tiller:
Security Breaches: Reporting. - Alan Berman, Jeffrey L. Ott:
Security Controls: Dial-Up. - Kevin Henry:
Security Development Lifecycle. - Leighton Johnson III:
Security Incident Response. - E. Eugene Schultz:
Security Information and Event Management (SIEM). - Sasan Hamidi:
Security Information Management: Myths and Facts. - Derek Schatz:
Security Management Program: Prioritization. - Ken Buszta:
Security Management Team Organization. - Todd Fitzgerald:
Security Policy Development and Distribution: Web-Based. - Patrick D. Howard:
Security Policy Lifecycle: Functions and Responsibilities. - Mike Buglewicz:
Security Risk: Goals Assessment. - Lynda L. McGhie:
Security Teams: Effective Methods. - Sean M. Price:
Security Test and Evaluation. - Jon David:
Server Security Policies. - Gilbert Held:
Service Level Agreements. - Glenn Cater:
Service Oriented Architecture (SOA). - Chris Hare:
Simple Network Management Protocol (SNMP). - Ross A. Leo:
Single Sign-On: Enterprise. - James S. Tiller:
Smartcards. - Marcus Rogers:
Social Engineering: Mitigation. - George G. McBride:
Software Development Lifecycles: Security Assessments. - Roxanne E. Burkey:
Software Piracy. - Ed Skoudis:
Sploits. - Gilbert Held:
Spoofing and Denial of Service Attacks. - Ken M. Shaurette, Thomas J. Schleppenbach:
Spyware. - Janice C. Sipior, Burke T. Ward, Georgina R. Roselli:
Spyware: Ethical and Legal Concerns. - Bonnie A. Goins Pilewski:
Standards. - Edward H. Freeman:
State of Washington v. Heckel. - Mark Edmead:
Steganography. - Sasan Hamidi:
Steganography: Detection. - Franjo Majstor:
Storage Area Networks. - David A. Litzau:
Surveillance: Closed-Circuit Television and Video. - William Hugh Murray:
System Design Flaws. - Ian Lim, Ioana V. Bazavan:
System Development Security: Methodology. - Sureerut Inmor, Vatcharaporn Esichaikul, Dencho N. Batanov:
Systems Development: Object-Oriented Security Model. - Don Evans:
Systems Integrity Engineering: Distributed Processing Concepts and Corresponding Security-Relevant Issues. - Don Evans:
Systems Integrity Engineering: Interoperable Risk Accountability Concepts. - Don Evans:
Systems Integrity Engineering: Methodology and Motivational Business Values and Issues. - William Stackpole, Man Nguyen:
Systems Management: Third-Party Applications and Systems.
T
- Sandy Bacik:
Tape Backups: Validation. - Felicia M. Nicastro:
Technology Convergence: People, Process and Technology. - Louis B. Fried:
Technology Convergence: Security. - William A. Yarberry Jr.:
Telephony Systems: Auditing. - Paul A. Henry:
Tokens: Authentication. - Joseph T. Hootman:
Tokens: Evaluation. - Jeffrey Davis:
Tokens: Role and Authentication. - R. Scott McCoy:
Transformation: Department-Level. - Chris Hare:
Transport Layer Security (TLS).
U
- Ed Skoudis:
Uniform Resource Locators (URLs): Obscuring. - Jeffery J. Lowder:
UNIX Security.
V
- Chris Hare:
Virtual Network Computing (VNC) Systems. - James S. Tiller:
Virtual Private Networks (VPNs). - Keith Pasley:
Virtual Private Networks (VPNs): Deployment and Evaluation Strategy. - James S. Tiller:
Virtual Private Networks (VPNs): Leverage. - Keith Pasley:
Virtual Private Networks (VPNs): Perspectives. - John R. Vacca:
Virtual Private Networks (VPNs): Remote Access. - Marcus Rogers, Sean C. Leshney:
Virtualization and Digital Investigations. - Valene Skerpac:
Voice Communications: Voice-over-Internet (VoI). - Anthony Bruno:
Voice Communications: Voice-over-IP (VoIP) Protocols. - George G. McBride:
Voice Communications: Voice-over-IP (VoIP) Security. - Bill Lipiczky:
Voice over WLAN. - Chris Hare:
Voice Security.
W
- Georges J. Jahchan:
Web Applications: Firewalls. - Mandy Andress:
Web Applications: Security. - Lynda L. McGhie:
Web Services. - Dennis Seymour Lee:
Wireless Internet Security: Portable Internet Devices. - Franjo Majstor:
Wireless Local Area Networks (WLANs). - Frandinata Halim, Gildas A. Deograt-Lumy:
Wireless Local Area Networks (WLANs): Challenges. - Franjo Majstor:
Wireless Local Area Networks (WLANs): Security. - Gilbert Held:
Wireless Local Area Networks (WLANs): Vulnerabilities. - Christopher A. Pilewski:
Wireless Penetration Testing. - George Richards:
Workplace Violence. - Lynda L. McGhie, Phillip Q. Maier:
World Wide Web.
X
- Samuel C. McClintock:
Xml. - William Hugh Murray:
XML and Other Metadata Languages.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.