O'Reilly logo

Hands-On Ethical Hacking and Network Defense by James E. Corley, Kent Backman, Michael T. Simpson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

INDEX

Symbols and Numerics

\ (backward slash), 114

/ (forward slash), 114

0phcrack program, 326

3DES (Triple Data Encryption Standard), 309

802.1X standard, 288–292

802.11 standard, 282–284

A

a command, 113

Aanui, Arnold (FBI agent), 62

AbortSystemShutdown() function, 174

acceptable use policy, 14

access control list, 339–340

access point (AP)

configuration, 278–281

wireless network technology, 275

ACK flag, 24

ACK scan, 104

Active Server Pages (ASP), 238, 242

ActivePerl, 164–166

ActiveX Data Objects (ADO), 251–252

Adleman, Leonard M. (RSA development), 312

ADO (ActiveX Data Objects), 251–252

ADS (alternate data stream), 184

Advanced Encryption Standard (AES), 310

adware, 60

Adware program, 61

AES (Advanced Encryption Standard), 310

AirCrack ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required