Index

Symbols
image
| (pipe), running Linux commands and
Numbers
image
11 security principles. See security principles
32-bit, BackTrack versions
40-bit WEP
64-bit, BackTrack versions
104-bit WEP
802.1q (trunking protocol)
802.1x (port-based access control)
adding authenticators for wireless network
applying authentication to wireless networks
authentication using
captive portals compared with
configuring authentication settings
installing RADIUS server and
overview of
preventing rogue wireless networks
RADIUS and
reconfiguration as troubleshooting approach ...

Get Wireless Network Security A Beginner's Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.