|
|
|
- Archibald Garrison
- 10 years ago
- Views:
Transcription
1 IV Foro de seguridad R edir IS SECURE WIRELESS LANS José C a sa d o M e l én d e z, S y st e m s E n g i n e e r, P u b l i c S e c t or S p a i n 1
2 A genda WLAN Security Vulnerabilities and Threats WLAN Security Authenticatio n and E ncryp tio n Wireless I D S Wireless NAC 2
3 W W L A N S ec urit y Vul nerab il it ies and T h reat s D if f erent f o rm Encryption Vulnerabilities: W s o f Vulnerabilities and Threats E x ist A uth entication Vulnerabilities: S h ared -K ey auth entication, D ictionary attack s, and M I T M attack s L A N S nif f ing and S S I D B road casting A d d ress S poof ing : M ac-ad d ress spoof ing and I P ad d ress spoof ing ( both h ostile/ outsid er attack s as w ell as insid er attack s) M isconf ig ured A P s and C lients D enial of S erv ice ( D os ) attack s: U sing d eauth entication/ d isassociation f ram es, R F j am m ing, etc. EP 3
4 W MM WW W E P E nc ry p t ion Random Number Generator (24 Bits) (IV) 24 bits Initial iz ation Vec tor AA C C AA ddresses in th e CC ll ear IV in th e CC ll ear E P K e y 22 4 Bits 40 or 104 Bits CC RC -3 2 FF rame PP ay ll oad S eed C RC -3 2 ICV RC 4 CC yy pp hh er XOR Ps e u d o -R am d o m S t r e am Plain t e x t EE P P EE nc ry pp ted PP ay ll oad and IC V 4
5 R W E P E nc ry p t ion A l gorit h m PP LL AA II NN TT EE XX T T DD AA TT AA R C 4 X O C I P H E R T E X T D A T A I V BA S E K E Y PP se uu dd o-r aa nd om SS tre aa mm 5
6 R RR RR K now n P l aint ex t A t t ac k I V BA S E K E Y R C 4 P se u d o- R a nd om S tre a m 011 P l a int e x t 101 X O R C ip h e rt e x t 110 E nc ry p tion: T h e Ps e u d o -R and o m O u t p u t f r o m W E Ps R C 4 C ip h e r I s X Q R e d w it h t h e Plaint e x t D at a t o Pr o d u c e t h e C ip h e r t e x t P. S. S tre a m P l a int e x t C ip h e rt e x t XX OO XX OO K P l a x A c k : I f C h e r t e x t I s X Q R e d w h K w ( o r G u e s s e d ) e x t, t h e S t r e C h e r O u t p u t C B e D e r e d now n inte t tta ip it no n Plaint am ip an iv C ip h e rt e x t 110 P re d ic te d P l a int e x t 101 X O P u d a S a m ( f W E P A l g m se o-r nd om tre rom orith ) 011 6
7 W G enerat ing K now n P l aint ex t S h ared K ey A ut h ent ic at ion C l ie nt W E P K e y A u th e ntic a tion R e q u e st 22.. AA uu th ee ntic aa tion RR ee sp onse (( CC hh aa ll ll ee ng e e ) 33.. AA uu th ee ntic aa tion RR ee qq uu ee st (( EE nc ry pp te d d CC hh aa ll ll ee ng e e ) 4. A u th e ntic a tion R e sp onse ( S u c c e ss) A c c e ss P oint W E P K e y i r e d N e t w or k Shared Key Authentication Is Not Recommended 7
8 G enerat ing K now n P l aint ex t S end T ex t D irec t l y t o R ec eiv er A u t h e n t i c a t e d C l i e n t 2. A t t a c k e r C i p h e r t e x t R e a c h e s V i c t i m CC ii pp hh ee rr tt ee xx tt L i st e n i n g A c c e ss P oi n t C or p or a t e N e t w or k I n t e r n e t PP ll aa ii nn tt ee xx tt 1. P l a i n t e x t D a t a S e n t t o V i c t i m A t t a c k e r 8
9 A genda WLAN Security Vulnerabilities and Threats WLAN Security Authenticatio n and E ncryp tio n Wireless I D S Wireless NAC 9
10 W B asic R eq uirem irel ess L A N s ent s t o S ec ure E ncryp tio n alg o rithm M M ech anism to prov id e d ata priv acy essag e integ rity Ensures d ata f ram es are tam per f ree and truly orig inate f rom th e source ad d ress Authenticatio n f ram ew o rk F ram ew ork to f acilitate auth entication m essag es betw een clients, access point, and A A A serv er Authenticatio n alg o rithm M ech anism to v alid ate client cred entials 10
11 H ow does E x t ensib l e A ut h ent ic at ion P rot oc ol ( E A P ) aut h ent ic at e c l ient s? W L A N C l ie nt A c c e ss P oint R A D I U S se rv e r C lient associates Corporate N etw ork C annot send d ata until D at a f r o m c lie nt B lo c k e d b y A P EA P auth entication com plete E A P x R A D I U S C lient send s d ata D at a f r o m c lie nt Pas s e d b y A P 11
12 W P A O v erv iew I nterim stand ard th at im prov es on W EP security prior to i I nclud es tw o auth entication m od es X auth entic ation P re-s h ared K ey (P S K ) I f using T em poral K ey I nteg rity P rotocol ( T K I P ) and X, th is prov id es d ynam ic k ey encryption and m utual auth entication th at im prov e on th e W EP encryption m od el I f using T em poral K ey I nteg rity P rotocol ( T K I P ) and P S K, th is prov id es d ynam ic k ey encryption and m utual auth entication th at d oes not req uire a R A D I U S serv er C om patible w ith portions of th e i d raf ts, includ ing im plem entation of X and T K I P 12
13 W P A 2 O v erv iew N ew security stand ard d ev eloped by I EEE i task g roup Robust S ec urity Netw ork (RS N) is IE E E eq uiv al ent to W P A 2 G enerally uses A d v anced Encryption S tand ard ( A ES ) block ciph ers w ith th e C ounter M od e-c B C M A C P rotocol ( C C M P ) f or encryption S up p orts T K IP G enerally uses x auth entication m eth od s S up p orts P S K C om parable to W P A U se th e same auth entic ation arc h itec ture, k ey distribution & k ey renew al S upports P roactiv e K ey C ach ing ( P K C ) S upports pre-auth entication ( optional) 13
14 WPA2 v e r s u s WPA C o n t e x t E A P S ession K ey W P A W P A 2 P S K x P S K x E nc ry p tion T K IP T K IP A E S T K IP A E S 14
15 M i/ W P A E A P A ut h ent ic at ion O v erv iew Station (STA) S T A X Bl oc k s P ort f or D a ta T ra f f ic A c c e ss P oi n t A P X Bl oc k s P ort f or D a ta T ra f f ic R A D I U S X / E A P -R e q u e st I d e ntity X / E A P -R e sp onse I d e ntity ( E A P T y p e S p e c if ic ) R A D I U S A c c e ss R e q u e st/ I d e ntity E A P T y p e S p e c if ic u tu a l A u th e ntic a tion D e riv e P a irw ise M a ste r K e y ( P M K ) D e riv e P a irw ise M a ste r K e y ( P M K ) R A D I U S A c c e p t ( w ith P M K ) X / E A P -S U C C E S S 802.1X R A D I U S 15
16 W L A N S ec urit y A ut h ent ic at ion and E nc ry p t ion S um m ary W L A N S ecurity encom passes both auth entication and encryption and both com ponents are m and ated by W P A C are sh ould be tak en to ascertain th at th e ch osen EA P auth entication type em ployed is com patible w ith auth entication d atabase W P A prov id es both d ynam ic, per-pack et k eying in ad d ition to k ey auth entication/ m essag e integ rity W L A N C lient capability/ av ailability m ust be consid ered w h en ch oosing W L A N auth entication and encryption options 16
17 A genda WLAN Security Vulnerabilities and Threats WLAN Security Authenticatio n and E ncryp tio n Wireless I D S Wireless NAC 17
18 Agenda Wireless IDS Defined C isc o Wireless Int ru sio n Det ec t io n So lu t io ns WLAN C o ntro ller-based Architecture A utonom ous A ccess P oint A rch itecture A utonom ous A ccess P oint A rch itecture w ith P artner I nteg ration 18
19 P rob l em D ef init ion Traditio nal w ired I D S f o cus o n L3 and hig her Nature o f R F m edium and w ireless standards m andate I D S at the p hysical and data link layer R F m edium v ulnerabilities: U nlicensed spectrum subj ect to interf erence, contention N ot contained by ph ysical security bound aries Standards v ulnerabilities: U nauth enticated m anag em ent f ram es S ession h i-j ack ing, replay type attack s Wide av ailability o f w to o ls ireless hack ing literature & 19
20 W irel ess Int rusion D et ec t ion S y st em s A d d ress R F related v ulnerabilities D etec t, l oc ate, mitig ate rog ue dev ic es D etec t and manag e RF interf erenc e D etec t rec onnaissanc e if p ossibl e A d d ress stand ard s-based v ulnerabilities D etec t manag ement f rame & h i-j ac k ing sty l e attac k s E nf orc e sec urity c onf ig uration p ol ic ies C om plem entary f unctionality: F orensic anal y sis C omp l ianc e rep orting C isc o h a s so lu t io ns t o a ddress WIDS req u irem ent s 20
21 WIDS WL A N C o nt ro ller-b a sed A rc h it ec t u re WLAN IDS WNB U j a k e w b m a n s f i e C i s c o S y s t e m s, I n c. A l l r i g h t s r e s e r v e d. 21
22 C W C S C S y M isc o ent ral iz ed ec urit anagem ent 22
23 Simultaneous IDS Monitoring & Service S i m u l t a n e ou s m u l t i -m od e, m u l t i -c h a n n e l I D S M on i t or i n g & S e r v i c e C h a nne l 3 A d h oc ne tw ork d e te c te d & c onta ine d X X C h a nne l 15 3 R og u e A P d e te c te d, l oc a te d & c onta ine d X C h a nne l 6 S e c u re D a ta S e rv ic e C h a nne l 5 2 S e c u re V ow X C h a nne l 6 V oid 11 a tta c k d e te c te d, d e v ic e l oc a te d & re m ov e d S e rv ic e L A N 23
24 IP S & H i-res L oc at ion T rac k ing 1. D e t e c t r og u e or a t t a c k 2. L oc a t e a t t a c k & t r a c k d e v i c e 3. A sse ss t h r e a t l e v e l & m i t i g a t e 4. C r e a t e H i st or i c a l R e p or t s 24
25 W Detect, Locate & Contain Rogue AP Demo Cisco D H CP on W ir e l e ss a d m in e na b l e d Cr ossov e r Cr ossov e r A P / 1 W E P on S S I D = cisco CH = 6/ 36 P ow e r = 5 M od e = L oca l A P A P / 2 W E P on S S I D = cisco CH = 11/ 56 P ow e r = 5 M od e = L oca l A P R og u e A P / R ou t e r S S I D = cisco CH = 1 W E P of f P C/ 1 A ssocia t e t o S S I D cisco S t a t ic I P = S S I D = cisco E P e na b l e d R u nning W CS P C/ 2 A ssocia t e t o r og u e S S I D = cisco W E P d isa b l e d 25
26 V erif y A P s are active: Monitor > A ccess P oints 26
27 M ap C am p us > B uil ding 27
28 M ap A P s in M eet ing R oom 28
29 S h ow R ogue A P A l arm 29
30 L oc at e R ogue A P ( H igh R esol ut ion) 30
31 M ap R ogue A P 31
32 Sh ow C lient C onnection & R ogue C onnection U p P C / 1 - P i n g C i sc o W L A N C on t r ol l e r P C / 2 - P i n g r og u e A P / r ou t e r
33 S h ow M anual R ogue C ont ainm ent 33
34 Sh ow A uth oriz ed C onnected R ogue C ontained P C / 1 S t i l l c on n e c t e d t o C i sc o P C / 2 R og u e c on n e c t i on c on t a i n e d 34
35 A genda W W W W LAN S ecur ity V ul ner ab il ities and T h r eats LAN S ecur ity Auth entication and E ncr y p tion ir el es s I DS ir el es s N AC 35
36 C ont rol de A dm isión? 1. C li e nt e s N o n-c o m p li a nt i nt e nt a n la c o ne x i ón 2. C o ne x i ón p e r m i t i d a 3. E x t e ns i ón d e la I nf e c c i ón E d i f i c i o C A M P U S RR ee d d CC or pp or aa tt ii vv aa 36
37 C ont rol de A dm Que h a c e isión: 1. C li e nt e s N o n-c o m p li a nt i nt e nt a n la c o ne x i ón 2. C u a r e nt e na / r e m e d i a c i ón 3. C o nt e nc i ón d e la i nf e c c i ón E d i f i c i o C A M P U S RR ee d d CC or pp or aa tt ii vv aa T r u st A g e n t RR ee mm CC uu aa rr ee nn tt ee nn aa ee dd ii aa cc ii on 37
38 C isc o N A C : D os m odel os NAC FRAMEWORK T r a d i c i o na l Ci s c o NAC Solución int e g r a d a con t od o e l e q uip a m ie nt o C is co NAC AP P L I ANCE S o l u c i ón Ci s c o Cl e a n Ac c e s s Solución a ut ocont e nid a Aa d a p t a c i ón a l a s ne c e s i d a d e s d e c a d a c l i e nt e 38
39 P M M E n q ue se dif erenc ian? N A C I nf ra e stru c tu ra Cisco T r u st A g e nt C l ie nte s a c c e d ie nd o a l a re d Cr e d e ncia l e s E A P / U D P, E A P / x N ot if ica ción 6 D isp ositiv os d e re d P ol ít ica s Cr e d e ncia l e s R A D I U S D e r e ch os d e a cce so 4 S e rv id or d e P ol ític a s P u nto d e d e c isión y re m A A A S e r v e r Cu m p l e? 3 e d ia c ión 2a Cr e d e nt ia l s H T T P S S e r v id or e s d e p a r t ne r s N A C A P P L I A N C E Cisco Cl e a n A cce ss 1 Cr e d e ncia l e s U D P ( d iscov e r y ) S S L Cl e a n A cce ss 2 a na g e r (CCA ) Cr e d e ncia l e s S N M cisco. com N ot if ica ción 4 P ol ít ica s 6 3 Cu m p l e / (r e p a r a ) 5 U p d a t e S e r v e r Windows. Symantec, caf ee, T r end, Sop h os, Z one, C A etc. 39
40 N A C A p p l ianc e: C isc o C l ean A c c ess Desp liegue inalámb rico N A C A p p li a nc e A r q u i t e c t u r a e n líne a 40
41 N A C Fram ew ork Despliegue in a lám b r ic o P A A u t óno m C l ie nte a c c e d ie nd o a l a re d o s X D isp ositiv o d e a c c e so P A A sig na c ión d inám ic a d e V L A N R A D I U S H CA P S e r v id or d e p a r t ne r P A L i g h t w e i g h t X D isp ositiv o d e a c c e so Cont r ol a d or S e r v id or d e p a r t ne r C l ie nte a c c e d ie nd o a l a re d P A A sig na c ión d inám ic a d e V L A N R A D I U S H CA P 41
42 42
ACE-1/onearm #show service-policy client-vips
M A C E E x a m Basic Load Balancing Using O ne A r m M ode w it h S ou r ce N A T on t h e C isco A p p licat ion C ont r ol E ngine Goal Configure b a s ic l oa d b a l a nc ing (L a y er 3 ) w h ere
H ig h L e v e l O v e r v iew. S te p h a n M a rt in. S e n io r S y s te m A rc h i te ct
H ig h L e v e l O v e r v iew S te p h a n M a rt in S e n io r S y s te m A rc h i te ct OPEN XCHANGE Architecture Overview A ge nda D es ig n G o als A rc h i te ct u re O ve rv i ew S c a l a b ili
First A S E M R e c to rs C o n f e re n c e : A sia E u ro p e H ig h e r E d u c a tio n L e a d e rsh ip D ia l o g u e Fre ie U n iv e rsitä t, B e rl in O c to b e r 2 7-2 9 2 0 0 8 G p A G e e a
3 k t h R e m e A c c e s s b t t t V T T c h t h p V T. Cl ic e ot rad io ut on nex o PN unnel yp e and oose e ap rop riat e PN unnel Int erfac e. 4.
C i s c o P r o f i l e C o n t a c t s & F e e d b a c k H e l p Cisc o SM B Sup p ort Assist ant Configure ASA/PIX as Easy VPN Server or Client H om e > W ork W it h M y Sec urit y D ev ic es > Cisc
1.- L a m e j o r o p c ió n e s c l o na r e l d i s co ( s e e x p li c a r á d es p u é s ).
PROCEDIMIENTO DE RECUPERACION Y COPIAS DE SEGURIDAD DEL CORTAFUEGOS LINUX P ar a p od e r re c u p e ra r nu e s t r o c o rt a f u e go s an t e un d es a s t r e ( r ot u r a d e l di s c o o d e l a
IronPort Gateway Security Products The Leader in Communication Security Reiner Baumann IronPort Systems The Principles of Industry Leadership A n a l y s t L e a d e r s h i p R e c o g n i z e d a s t
Data Center end users for 40G/100G and market dy nami c s for 40G/100G on S M F Adam Carter Ci s c o 1 W Now that 40GbE is part of the IEEE 802.3ba there will be a wid er array of applic ation s that will
UNDERSTANDING FLOW PROCESSING WITHIN THE CISCO ACE M ODULE Application de liv e r y pr odu cts can distr ib u te tr af f ic to applications and w e b se r v ice s u sing v ar y ing le v e ls of application
m Future of learning Zehn J a hr e N et A c a d ei n E r f o l g s p r o g r a m Cisco E x p o 2 0 0 7 2 6. J u n i 2 0 0 7, M e sse W ie n C. D or n in g e r, b m u k k 1/ 12 P r e n t t z d e r p u t
Application Note: Cisco A S A - Ce r t if ica t e T o S S L V P N Con n e ct ion P r of il e Overview: T h i s a p p l i ca ti o n n o te e x p l a i n s h o w to co n f i g u r e th e A S A to a cco m
Collaboration in Public H e alth be tw e e n U niv e rs ity of H e id e lbe rg and U niv e rs ity of D ar e s S alaam How t h e c oop e r a t i on e m e r g e d Informal c ont ac t s from e arly 1 9
SCHOOL PESTICIDE SAFETY AN D IN TEG R ATED PEST M AN AG EM EN T Statutes put into law by the Louisiana Department of Agriculture & Forestry to ensure the safety and well-being of children and school personnel
SIV for VoiceXM 3.0: a n g u a g e a n d A p p l ica t ion D es ig n C on s id era t ion s Ken Rehor C i s c o S y s t em s, I nc. [email protected] March 05, 2009 G VoiceXM Application Architecture PSTN
Enterprise Data Center A c h itec tu re Consorzio Operativo Gruppo MPS Case S t u d y : P r o g et t o D i sast er R ec o v er y Milano, 7 Febbraio 2006 1 Il G r u p p o M P S L a B a n c a M o n t e d
G ri d m on i tori n g w i th N A G I O S (*) (*) Work in collaboration with P. Lo Re, G. S av a and G. T ortone WP3-I CHEP 2000, N F N 10.02.2000 M e e t i n g, N a p l e s, 29.1 1.20 0 2 R o b e r 1
Positioning 40 and 100 GbE in data center inter-sw itch l ink ap p l ications and 40GbE PM D recom m endations Adam Carter, Cisco Al essan dro B arb ieri, Cisco 1 m Data Center inter-s w itc h l ink ap
The Business Case for D om aink ey s I d ent ified M ail Andy Spillane V ic e P r es ident, Y ah o o! M February 13, 2006 ail 1 Fighting Spam & Email Abuse R eq uir es a M ulti-fac eted Appr o ac h DomainKeys
Device I n s t r u m en t a t io n E x a m p l es : I P S L A s & N et F l o w Presented by Emmanuel Tychon Techni cal M ark eti ng Eng i neer TU D resden, J anuary 1 7 th 2 0 0 7 1. C is co I O S I P
AN EVALUATION OF SHORT TERM TREATMENT PROGRAM FOR PERSONS DRIVING UNDER THE INFLUENCE OF ALCOHOL 1978-1981. P. A. V a le s, Ph.D.
AN EVALUATION OF SHORT TERM TREATMENT PROGRAM FOR PERSONS DRIVING UNDER THE INFLUENCE OF ALCOHOL 1978-1981 P. A. V a le s, Ph.D. SYNOPSIS Two in d ep en d en t tre a tm e n t g ro u p s, p a r t ic ip
O s OAM Requirements for 40/100 GE Eth ernet AI S? Gary Nicholl C is co S ys t e m I E E E 8 0 2. 3 b a T as k F orce M arch 1 8, 2 0 0 8 rlan d o, F L 1 O O O O Background E t h e r n e t i s r a p i
EM EA. D is trib u te d D e n ia l O f S e rv ic e
EM EA S e c u rity D e p lo y m e n t F o ru m D e n ia l o f S e rv ic e U p d a te P e te r P ro v a rt C o n s u ltin g S E p p ro v a rt@ c is c o.c o m 1 A g e n d a T h re a t U p d a te IO S Es
Campus Sustainability Assessment and Related Literature
Campus Sustainability Assessment and Related Literature An Annotated Bibliography and Resource Guide Andrew Nixon February 2002 Campus Sustainability Assessment Review Project Telephone: (616) 387-5626
W Cisco Kompetanse eek end 2 0 0 8 SMB = Store Mu ll ii gg hh eter! Nina Gullerud ng ulleru@ c is c o. c o m 1 Vår E n t e r p r i s e e r f a r i n g... 2 S m å o g M e llo m s t o r e B e d r i f t e
IntИg r a ti o n d e s s o l u ti o ns IB M e t C i s c o : C o l l a b o r a ti o n e t C o m m u ni c a ti o ns U ni f i Иe s ( U C 2 ) Mathieu in tr at Sales Business ev elop ent anag er om unic at
I n la n d N a v ig a t io n a co n t r ib u t io n t o eco n o m y su st a i n a b i l i t y
I n la n d N a v ig a t io n a co n t r ib u t io n t o eco n o m y su st a i n a b i l i t y and KB rl iak s iol mi a, hme t a ro cp hm a5 a 2k p0r0o 9f i,e ls hv oa nr t ds eu rmv oedye l o nf dae cr
e Videobewaking ov er I P Marty K n o p e rt 1 A l l m z u l l b t g r u m a k h w k h w k z a l z r E p r m a r k t t c m a r k t Video vision: e vor en va n video en in de na ij e oek om st eb ik en
Bonn Declaration on Regional Cooperation in Quality Assurance in Higher Education Adopted on 20 June 2007 during the Conference Enhancing Quality Across Borders R egional Cooperation in Quality Assurance
proxy cert request dn, cert, Pkey, VOMS cred. (short lifetime) certificate: dn, ca, Pkey mod_ssl pre-process: parameters->
Overview of the New S ec u rity M od el WP6 Meeting V I D t G R I D C o nf er enc e B r c el o ne, 1 2-1 5 M y 2 0 0 3 Overview focus is on VOMS C A d e t il s r e in D 7. 6 Se cur it y D e sig n proxy
M Fast forward into th e fu tu re Accelerating b u s ines s o p p o rtu nity and natio nal p ro s p erity Viktor Kovacs anaging D irecto r H u ngary & Ad riatic R egio n C h a n g e t h e w o r l d» O
W Regional Cooperation in the Field of A u tom otiv e E ngineering in S ty ria Dr. Peter Riedler 2 9.1 1.2 0 1 1 i e n GmbH Graz B u s ines s S trategy S ty ria 2 0 2 0 H is tory 1 9 9 4 1 9 9 5 1 9 9
PSTN. Gateway. Switch. Supervisor PC. Ethernet LAN. IPCC Express SERVER. CallManager. IP Phone. IP Phone. Cust- DB
M IPCC EXPRESS Product Solution (IPCC - IP Co n t a c t Ce n t e r ) E i n f ü h r u n g Ü b e r h u nd e r t M il l io ne n N u t ze r - P r o g no s e n zu f o l g e w e r d e n e s in d ie s e m J ah
i n g S e c u r it y 3 1B# ; u r w e b a p p li c a tio n s f r o m ha c ke r s w ith t his å ] í d : L : g u id e Scanned by CamScanner
í d : r ' " B o m m 1 E x p e r i e n c e L : i i n g S e c u r it y. 1-1B# ; u r w e b a p p li c a tio n s f r o m ha c ke r s w ith t his g u id e å ] - ew i c h P e t e r M u la e n PACKT ' TAÞ$Æo
M P L S /V P N S e c u rity. 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d.
M P L S /V P N S e c u rity M ic h a e l B e h rin g e r < m b e h rin g @ c is c o.c o m > M b e h rin g - M P L S S e c u rity 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d. 1 W h
SCO TT G LEA SO N D EM O Z G EB R E-
SCO TT G LEA SO N D EM O Z G EB R E- EG Z IA B H ER e d it o r s N ) LICA TIO N S A N D M ETH O D S t DVD N CLUDED C o n t e n Ls Pr e fa c e x v G l o b a l N a v i g a t i o n Sa t e llit e S y s t e
Video og IP TV - h v or da n p هv ir k es n et t v er k en e? t t a d A c c o u n t M a n a g S P / T o m S m t Ole-P et er R s er elec eg en 1 Hva gjorde vi u t en T V.... 2 2 0 0 m il l s am t idige
Cisco Security Agent (CSA) CSA je v í c eúčelo v ý s o f t w a r o v ý ná s t r o j, k t er ý lze p o už í t k v ynuc ení r ů zný c h b ezp ečno s t ní c h p o li t i k. CSA a na lyzuje c h o v á ní a
Practice Writing the Letter A
Aa Practice Writing the Letter A A a A a Write a in the blank to finish each word. c t re h d Write A in the blank to finish each word. nn US ndy Bb Practice Writing the Letter B B b B l P b Write b in
Put the human back in Human Resources.
Put the human back in Human Resources A Co m p l et e Hu m a n Ca p i t a l Ma n a g em en t So l u t i o n t h a t em p o w er s HR p r o f essi o n a l s t o m eet t h ei r co r p o r a t e o b j ect
How To Be A Successful Thai
D The Joint Master of Science eg ree C ou rse in V eterinary P u b l ic H eal th ( MScVPH), F U -C MU Dr. L e rt ra k S ri k i t j a k a rn R e g i o n a l C e n t re f o r V e t e ri n a ry P u b l i
Workload Management Services. Data Management Services. Networking. Information Service. Fabric Management
The EU D a t a G r i d D a t a M a n a g em en t (EDG release 1.4.x) T h e Eu ro p ean Dat agri d P ro j ec t T eam http://www.e u - d a ta g r i d.o r g DataGrid is a p ro j e c t f u n de d b y th e
M Mobile Based Clinical Decision Support System Bhudeb Chakravarti & Dr. Suman Bhusan Bhattacharyya Provider & Public Health Group, VBU-HL P S aty am C om puter S ervices L im ited Bhudeb_ C hak ravarti@
How to Subnet a Network How to use this paper Absolute Beginner: Read all Sections 1-4 N eed a q uick rev iew : Read Sections 2-4 J ust need a little h elp : Read Section 4 P a r t I : F o r t h e I P
Ontwikkelingen van R o u ter N etwer ken Fred Rabouw 1 3-t i e r R o u t e r N e t w e r k e n. Core: forwarden van grote h oeveel h eden data. D i s tri b u ti e: Cl as s i fi c eren en fi l teren A c
Internationalization strategy of the SEPT Program Design of market-oriented training and ed u c ation p rod u c ts Utz D o r n b e r g e r ( Un i v e r s i ty o f L e i p zi g ) & N g u y e n T h i T h
CIS CO S Y S T E M S. G u ille rm o A g u irre, Cis c o Ch ile. 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d.
CIS CO S Y S T E M S A c c e s s T e c h n o lo g y T e le c o m /IT Co n n e c tiv ity W o rk s h o p G u ille rm o A g u irre, Cis c o Ch ile g m o.a g u irre @ c is c o.c o m S e s s io n N u m b e
UNIK4250 Security in Distributed Systems University of Oslo Spring 2012. Part 7 Wireless Network Security
UNIK4250 Security in Distributed Systems University of Oslo Spring 2012 Part 7 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s charter to develop
Unit 16 : Software Development Standards O b jec t ive T o p r o v id e a gu ide on ho w t o ac h iev e so f t wa r e p r o cess improvement through the use of software and systems engineering standards.
Public Health is Like..
Public Health is Like.. A box of chocolates. you never know what your gonna get, Forrest Gump. So... Build the evidence-base for public health practice Building the Evidence- Base Science is contributing
Overview of Spellings on www.spellzoo.co.uk
Overview of Spellings on www.spellzoo.co.uk Year 1 Set 1: CVC words Set 2: CVC and CCVC words Set 3: CVC, CCVC and CCVCC words Set 4: Words containing 'ch', 'sh', 'th' and 'wh' Set 5: Words ending in 'll',
How To Manage A Large Amount Of Information From A Computer To A Computer
Document Management Provides HR Departments With Considerable Benefits David Avino M arketing Technical C oord inator d a vin o@ we s tb rook te ch. com I n n ova tive con ten t m a n a ge m en t softwa
B a rn e y W a r f. U r b a n S tu d ie s, V o l. 3 2, N o. 2, 1 9 9 5 3 6 1 ±3 7 8
U r b a n S tu d ie s, V o l. 3 2, N o. 2, 1 9 9 5 3 6 1 ±3 7 8 T e le c o m m u n ic a t io n s a n d th e C h a n g in g G e o g r a p h ie s o f K n o w le d g e T r a n s m is s io n in th e L a te
w ith In fla m m a to r y B o w e l D ise a se. G a s tro in te s tin a l C lin ic, 2-8 -2, K a s h iw a z a, A g e o C ity, S a ita m a 3 6 2 -
E ffic a c y o f S e le c tiv e M y e lo id L in e a g e L e u c o c y te D e p le tio n in P y o d e r m a G a n g re n o su m a n d P so r ia sis A sso c ia te d w ith In fla m m a to r y B o w e l D
W h a t is m e tro e th e rn e t
110 tv c h a n n e ls to 10 0 0 0 0 u s e rs U lf V in n e ra s C is c o S y s te m s 2 0 0 2, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d. 1 W h a t is m e tro e th e rn e t O b je c tiv
Cisco Self-D efen d in g N et w Adaptive Threat Defense or k Latest Product Announcements 1 N ew Secu r it y Ch a llen g es E d g e F i r e w a l l i n g I n t r u s i o n & W o r m M i t i g a t i o n
FORT WAYNE COMMUNITY SCHOOLS 12 00 SOUTH CLINTON STREET FORT WAYNE, IN 468 02 6:02 p.m. Ma r c h 2 3, 2 015 OFFICIAL P ROCEED ING S Ro l l Ca l l e a r d o f h o o l u e e o f t h e r t y m m u t y h o
G S e r v i c i o C i s c o S m a r t C a r e u ي a d e l L a b o r a t o r i o d e D e m o s t r a c i n R ل p i d a V e r s i n d e l S e r v i c i o C i s c o S m a r t C a r e : 1 4 ع l t i m a A c
Objectivity Data Migration after C5 presentation, 18 th O c t 2 0 0 2 Marcin Nowak, C E R N D at ab as e G rou p, h t t p : / / ce rn.ch / d b Overview Objectivity/DB cu r r en t u s a g e Da ta th a t
PRIMER TESTIMONIO. -F o l i o n ú m e r o 1 2 0. ḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋ ESC RITU RA NU MERO TREINTA.- E n l a c i u d a d d e B u e n os A i r e s, c a p i t a l d e l a R e p ú b l i c
Tsukuba Recent Trends in Higher Education in Japan I. In t e r n a t i o n a l i z a t i o n o f J a p a n e s e U n i v e r s i t i e s II. C h a n g i n g U n i v e r s i t i e s i n J a p a n Hiroshi
Using Predictive Modeling to Reduce Claims Losses in Auto Physical Damage
Using Predictive Modeling to Reduce Claims Losses in Auto Physical Damage CAS Loss Reserve Seminar 23 Session 3 Private Passenger Automobile Insurance Frank Cacchione Carlos Ariza September 8, 23 Today
Workload Management Services. Data Management Services. Networking. Information Service. Fabric Management
The EU D a t a G r i d I n f o r m a t i o n a n d M o n i t o r i n g S er v i c es The European D at ag ri d P roj ec t Team http://www.eu- d a ta g r i d.o r g DataGrid is a p ro j e c t f u n de d
Software Quality Requirements and Evaluation, the ISO 25000 Series
Pittsburgh, PA 15213-3890 Software Quality Requirements and Evaluation, the ISO 25000 Series PSM Technical Working Group February 2004 Dave Zubrow Sponsored by the U.S. Department of Defense Background
RIEEW 2007 C i s c o m e e t s T U D r e s d e n Device Manageability I ns tr u m entatio n ( DMI ) O ver view [ D r e s d e n 200701 1 7] B r u n o K l a u s e r C o n s u l t i n g En g i n e e r N M
R e t r o f i t o f t C i r u n i s g e C o n t r o l
R e t r o f i t o f t C i r u n i s g e C o n t r o l VB Sprinter D e s c r i p t i o n T h i s r e t r o f i t c o n s i s t s o f i n s t a l l i n g a c r u i s e c o n t r o l s wi t c h k i t i n
CS254 Network Technologies
CS254 Network Technologies Lecture 9: Peer-to-Peer Networks I James Salter Department of Computing University of Surrey Autumn 2006 What is P 2 P C o m p u tin g? Everybody seems to have a different idea
CUSTOMER INFORMATION SECURITY AWARENESS TRAINING
CUSTOMER INFORMATION SECURITY AWARENESS TRAINING IN T RO DUCT ION T h i s c o u r s e i s d e s i g n e d to p r o v i d e yo u w i t h t h e k n o w l e d g e to p r o t e c t y o u r p e r s o n a l
Online Department Stores. What are we searching for?
Online Department Stores What are we searching for? 2 3 CONTENTS Table of contents 02 Table of contents 03 Search 06 Fashion vs. footwear 04 A few key pieces 08 About SimilarWeb Stepping up the Competition
CREATE SHAPE VISUALIZE
SHAPE VISUALIZE B I M E q u i t y BIM Workflow Guide SHAPE VISUALIZE Introduction We o e to t e r t ook i t e BIM Workflow erie I t e o owi ter we wi o er e eryt i eeded or you to ter t e i o re ti i d
C o a t i a n P u b l i c D e b tm a n a g e m e n t a n d C h a l l e n g e s o f M a k e t D e v e l o p m e n t Z a g e bo 8 t h A p i l 2 0 1 1 h t t pdd w w wp i j fp h D p u b l i c2 d e b td S t
Service Provider IPv6 Deployment Igor Giangrossi [email protected] 2 0 0 8 C i s c o S y s t e m s, I n c. A l l r i g h t s r e s e r v e d. C i s c o P u b l i c 1 Prerequisites: Session Abstract
http://www.springer.com/3-540-24371-2
http://www.springer.com/3-540-24371-2 3 F o u n d a t i o n s T h i s c h ap t e r l ay s d o w n t h e f u n d am e n t al i d e as an d c h o i c e s o n w h i c h o u r ap p r o ac h i s b as e d. F
Understanding, Modelling and Improving the Software Process. Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1
Process Improvement Understanding, Modelling and Improving the Software Process Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1 Process improvement Understanding existing processes
How To Know If You Are A Good Or Bad Person
QuesCom I P -T E L E F O N I E & G S M -G A T E W A Y S Robert Urban D i rec tor I nternati onal S al es Agenda Üb e r Q u e s C o m K u n d e n M a r k t üb e r s i c h t Q u e s c o m Lös u n g Q u e
B R T S y s te m in S e o u l a n d In te g r a te d e -T ic k e tin g S y s te m
Symposium on Public Transportation in Indian Cities with Special focus on Bus Rapid Transit (BRT) System New Delhi 20-21 Jan 2010 B R T S y s te m in S e o u l a n d In te g r a te d e -T ic k e tin g
Stratesave 6.0 The comfortably organized backup solution for your PCs U ser M an u al Stratesave Systems GmbH Copyright 1996-2010, Strate s av e Sys te m s G m bh, al l rights re s e rv e d. A l l trad
Der Bologna- P roz es s u nd d i e S t aat s ex am Stefan Bienefeld i na Service-St el l e B o l o g n a d er H R K Sem in a r D er B o l o g n a P ro z es s U m s et z u n g u n d M it g es t a l t u
Thuraya XT-LITE Simple. Reliable. Affordable.
Thuraya XT-LITE Simple. Reliable. Affordable. www.thuraya.com Follow us on /thurayatelecom Stayi n g c on n ec ted has n ever b een thi s eas y. In trodu c i n g T hu raya X T -LIT E, the wo r l d s be
HR DEPARTMENTAL SUFFIX & ORGANIZATION CODES
HR DEPARTMENTAL SUFFIX & ORGANIZATION CODES Department Suffix Organization Academic Affairs and Dean of Faculty, VP AA 1100 Admissions (Undergraduate) AD 1330 Advanced Ceramics, Colorado Center for--ccac
GlasCraft Air Motor Repair Kits
Parts GlasCraft ir Motor Repair Kits 30393B ENG For replacing wear items used on GlasCraft air motors. For professional use only. Not for use in explosive atmospheres. Models M-325, M-500-02, GC2267, GC2273
III Bienal de Autismo Página 1 / 43
III Bienal de Autismo Página 1 / 43 A Direcção da APPDA N ort e dá -v os as B oas V in das à I I I B ien al de Au t is m q u e es t a corres p on da à s v os s as ex p ect at iv as com o t em a em deb
MS IN EARLY CHILDHOOD STUDIES
MS IN EARLY CHILDHOOD STUDIES Child Development (CD) C D001 - T h eo r ies of C h i ld D eve l opm e nt Demo ns t rate a n understand i ng of theories and concepts o f ch ild deve lo pme nt. C D002 - K
Ma teria ls to fix p osters to the b oa rd s will b e p rovid ed b y the organization at the Conference site.
Dear Participant, We would like to welc ome you to the 2nd International Conference on Biodegradable Polymers and Sustainable Composites (BIOPOL-2009) a nd wish you a pleasant stay in our city. Below you
Bewährte Six Sigma Tools in der Praxis
Frankfurt School of Finance & Management 2. ProcessLab-Workshop 03.2.2008, 8h Bewährte Six Sigma Tools in der Praxis A. Raab BB Certified GE Commercial Finance Agenda Intro Teaser Vortrag Break Out Sessions
<?xml version="1.0" encoding="utf-8"?> <soapenv:envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"
Applicazioni Java W S con Ax is sistema di tr ac c iab il ità ag r o al imen tar e Ing. Mario G.C.A. Cimino M.G.C.A.Cimino, Applicazioni Java-W S con Ax is, D ipar t ime nt o d i I ng e g ne r ia d e ll
Cisco D a t a Ce n t e r N e t w or k A r ch it e ct u r e 1 What is Cisco Data Center? Cisco Systems Core Technologies A d v a nced Technologies Switching R o u ting D a ta C e nte r W ir e l e s s U
Heliophysics Integrated Observatory Coordinated Data Analysis Workshop
Heliophysics Integrated Observatory Coordinated Data Analysis Workshop 24 th of October 2011 Trieste Architecture and Demonstrations http://www.helio-vo.eu Mapping the General Science Use Case to an Architecture
G d y n i a U s ł u g a r e j e s t r a c j i i p o m i a r u c z a s u u c z e s t n i k ó w i m p r e z s p o r t o w y c h G d y s k i e g o O r o d k a S p o r t u i R e k r e a c j i w r o k u 2 0
A n d r e w S P o m e r a n tz, M D
T e le h e a lth in V A : B r in g in g h e a lth c a r e to th e u n d e r s e r v e d in c lin ic a n d h o m e A n d r e w S P o m e r a n tz, M D N a tio n a l M e n ta l H e a lth D ir e c to r f
NAMA FILM Aleksinackih rudara 39A 11070 Beograd, Serbia Tel/Fax:+381 11 2 603 762 Mobile: +381 63 206440 [email protected] www.goranradovanovic.
SYNOPSIS T h e A m b u l a n c e i s a c o n t e m p o r a r y h i s t o r i c a l f i l m r e f l e c t i n g t h e d r a m a o f t h e p r o f o u n d s o c i a l c h a n g e s t h a t t h e S e r b
T ra d in g A c tiv ity o f F o re ig n In s titu tio n a l In v e s to rs a n d V o la tility
T ra d in g A c tiv ity o f F o re ig n In s titu tio n a l In v e s to rs a n d V o la tility V. Ravi Ans human Indian Ins titute of Manag ement B ang alore Rajes h Chakrabarti Indian S chool of Bus ines
S y ste m s. T h e D atabase. D atabase m anagem e n t sy ste m
1 C h apte r 1 1 A D atabase M anagem e n t S y ste m s 1 D atabase M anagem e n t S y ste m s D atabase m anagem e n t sy ste m (D B M S ) S to re larg e co lle ctio n s o f d ata O rg anize th e d ata
U S B Pay m e n t P r o c e s s i n g TM
U S B Pay m e n t P r o c e s s i n g T h a t s S m a r t P r o c e s s i n g TM USB was simple to enroll in. They had competitive rates and all the fees were listed clearly with no surprises. Everyone
