![Computing / Cyberwarfare / Cryptographic protocols / IEEE 802.11 / Data security / Information security / Password / Access control / Wi-Fi / Security / Computer security / Computer network security Computing / Cyberwarfare / Cryptographic protocols / IEEE 802.11 / Data security / Information security / Password / Access control / Wi-Fi / Security / Computer security / Computer network security](https://www.pdfsearch.io/img/97dc45c8a06a9378e046743c0d58fd5f.jpg)
| Document Date: 2008-05-20 12:42:00 Open Document File Size: 151,37 KBShare Result on Facebook
IndustryTerm Internet-facing applications / Web applications / secure systems / Web servers / anti-virus software / point-of-sale products / unnecessary services / backup media / wireless technology / software/hardware / wireless gateways / Web Application Security Project / wireless handheld devices / wireless analyzer / media containing cardholder data / software development life cycle / security systems / public networks / encryption technologies / media devices / wireless networks / wireless access points / wireless devices / border routers / remote access software / internal network / / Product SQL injection / / ProgrammingLanguage SQL / / Technology 128-bit encryption / encryption / 1.2 If wireless technology / SNMP / WEP / 2.3 If wireless technology / wireless access / encryption technologies / wireless devices / firewall / 1.7 If wireless technology / VPN / 2.4 If wireless technology / network address translation / 11.1 If wireless technology / 9.2 If wireless technology / 4.5 Is encryption / 4.3 If wireless technology / SSL / border routers / anti-virus software / Wi-Fi / 4.4 If wireless technology / / URL www.owasp.org / /
SocialTag |