SlideShare a Scribd company logo
1 of 22
Download to read offline
SESSION ID:
#RSAC
Dr. Avril Salter, CCNP-W
What IT Professionals Need to
Know about Sniffing Wireless
Traffic in 2016
MBS-R05
Wireless Implementation Architect
Salter & Associates
@avrilsalterUSA
#RSAC
What We Are Discussing
2
Emerging
antenna
technologies
Implications to
wireless network
security
#RSAC
Privacy Rights
Electronic Communications Privacy Act (ECPA)
Protects e-mail messages from interception and disclosure to third parties
Wiretap Act
Federal law protecting privacy of communications
Intercept, disclose, or use the contents of any
Wire
Oral
Electronic communication
Exceptions allows employers to monitor communications in the ordinary
course of business
#RSAC
Protocol and Spectrum Analyzers
4
Protocol Analyzer Spectrum Analyzer
#RSAC
Which Networks Can You Sniff?
5
Technology
Wi-Fi
Cellular
Bluetooth
ZigBee
Influencing Factors
Different network adapter
Range depends on
Transmit power
Receiver antenna gain
Frequency bands
#RSAC
Defining MIMO
6
n transmit
antennas
m receive
antennas
Input into the
RF medium
Output from the
RF medium
Multiple Input
antennas
Multiple Output
antennas
+
= n x m MIMO
…
…
#RSAC
Multi-Antenna Technologies
7
Mechanism Performance advantage
Spatial Multiplexing Higher user data rates
Space Time Coding Improves SNR
- Coverage
Beamforming Extends the range where
higher data rates can be attained
Multi-User MIMO Increases throughput
#RSAC
Spatial Multiplexing
8
3x3 MIMO2x2 MIMO
MIMOMapping
S1
S2
a11 S1 + a12 S2
a21 S1 + a22 S2
MIMOMapping
S1
S2
a11 S1+ a12 S2 + a13 S3
a21 S1 + a22 S2+ a23 S3
a31 S1 + a32 S2+ a33 S3
S3
#RSAC
Spatial Multiplexing
9
Number of receive antennas ≥ Transmit antennas
#RSAC
Implications
10
Are you capturing all the
wireless traffic?
#RSAC
Beamforming
11
#RSAC
Creating Radiation Patterns
12
In theory
N * (N - 1) beams
N - 1 nulls
g1Ø1 g2Ø2 g8Ø8g3Ø3 g4Ø4 g5Ø5 g6Ø6 g7Ø7
#RSAC
Antenna Reciprocity
13
It is common practice to describe antenna characteristics
from the perspective of the transmitter
#RSAC
Implications
14
Are you capturing all the
wireless traffic?
#RSAC
Multi-User MIMO
15
Transmit to multiple users
On same frequency channel
At the same time
#RSAC
Multi-User MIMO
16
Are you capturing all the
wireless traffic?
#RSAC
Massive MIMO
17
#RSAC
What You Need To Know
18
MU-MIMO
Mobile networks
LTE Advanced
Wi-Fi networks
802.11ac
5G
Omni-directional antennas
IoT networks
ZigBee
WirelessHart
ISA100-11a
Wi-SUN
Bluetooth Low Energy
#RSAC
What About IoT Networks
19
Requires explicit feedback
Size and power performance limitations
Multi-hop mesh for reliability
#RSAC
Implications
20
Over-the-air captures are significantly
more complex
Arguably some wireless networks are
more secure
Hackers would need techniques that
minimize use of MU-MIMO
E.g. Disruptive interference
#RSAC
What You Should Do Now
21
Know the limitations of the
antenna technologies you are using
for analyzing over-the-air traffic
Understand disruptive techniques
and how to identify them
#RSAC
Thank you for listening 
22
www.linkedin.com/in/avrilsalter
@avrilsalterUSA

More Related Content

What's hot

What's hot (20)

Wsn
WsnWsn
Wsn
 
Ruckus Wireless ZoneDirector 3000 Product Card
Ruckus Wireless ZoneDirector 3000 Product CardRuckus Wireless ZoneDirector 3000 Product Card
Ruckus Wireless ZoneDirector 3000 Product Card
 
A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...
 
An Ethernet-Based Coaxial Switching System , Final Presentation
An Ethernet-Based Coaxial Switching System , Final PresentationAn Ethernet-Based Coaxial Switching System , Final Presentation
An Ethernet-Based Coaxial Switching System , Final Presentation
 
Ruckus Wireless ZoneFlex R700 Product Card
Ruckus Wireless ZoneFlex R700 Product CardRuckus Wireless ZoneFlex R700 Product Card
Ruckus Wireless ZoneFlex R700 Product Card
 
"Integration of wireless sensor technology, Internet tools y computational me...
"Integration of wireless sensor technology, Internet tools y computational me..."Integration of wireless sensor technology, Internet tools y computational me...
"Integration of wireless sensor technology, Internet tools y computational me...
 
Ruckus Wireless ZoneFlex R500 Product Card
Ruckus Wireless ZoneFlex R500 Product CardRuckus Wireless ZoneFlex R500 Product Card
Ruckus Wireless ZoneFlex R500 Product Card
 
Ruckus Wireless ZoneFlex R600 Product Card
Ruckus Wireless ZoneFlex R600 Product CardRuckus Wireless ZoneFlex R600 Product Card
Ruckus Wireless ZoneFlex R600 Product Card
 
Introducing the next generation industrial switch platform
Introducing the next generation industrial switch platformIntroducing the next generation industrial switch platform
Introducing the next generation industrial switch platform
 
Ruckus Wireless ZoneDirector 5000 Product Card
Ruckus Wireless ZoneDirector 5000 Product CardRuckus Wireless ZoneDirector 5000 Product Card
Ruckus Wireless ZoneDirector 5000 Product Card
 
NB-IoT technology RuseConf 2019
NB-IoT technology RuseConf 2019NB-IoT technology RuseConf 2019
NB-IoT technology RuseConf 2019
 
IoT Wireless Technologies
IoT Wireless TechnologiesIoT Wireless Technologies
IoT Wireless Technologies
 
Low power interconnectivity
Low power interconnectivity Low power interconnectivity
Low power interconnectivity
 
Sigfox User Group Launch UK
Sigfox User Group Launch UKSigfox User Group Launch UK
Sigfox User Group Launch UK
 
Sigfox Overview
Sigfox OverviewSigfox Overview
Sigfox Overview
 
Bosch Connected Experience - Sigfox Presentation
Bosch Connected Experience - Sigfox PresentationBosch Connected Experience - Sigfox Presentation
Bosch Connected Experience - Sigfox Presentation
 
Public Safety and First Responders - Application Brief
Public Safety and First Responders - Application BriefPublic Safety and First Responders - Application Brief
Public Safety and First Responders - Application Brief
 
Sigfox + Arduino MKRFOX Workshop
Sigfox + Arduino MKRFOX WorkshopSigfox + Arduino MKRFOX Workshop
Sigfox + Arduino MKRFOX Workshop
 
BCX17 - Sigfox intro
BCX17 - Sigfox introBCX17 - Sigfox intro
BCX17 - Sigfox intro
 
Sigfox Euratech Workshop
Sigfox Euratech WorkshopSigfox Euratech Workshop
Sigfox Euratech Workshop
 

Viewers also liked

Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
leminhvuong
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connections
guest85e156e
 

Viewers also liked (11)

Hacking tools
Hacking toolsHacking tools
Hacking tools
 
DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?
 
Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection tool
 
Hacking wireless networks
Hacking wireless networksHacking wireless networks
Hacking wireless networks
 
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSuper Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
 
Packet sniffing & ARP Poisoning
 Packet sniffing & ARP Poisoning  Packet sniffing & ARP Poisoning
Packet sniffing & ARP Poisoning
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connections
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Alphorm.com Formation CEHV9 III
Alphorm.com Formation CEHV9 IIIAlphorm.com Formation CEHV9 III
Alphorm.com Formation CEHV9 III
 

Similar to What IT Professionals Need to Know about Sniffing Wireless Traffic in 2016

5G NR_optimizing RAN design architecture to support new standards.pdf
5G NR_optimizing RAN design architecture to support new standards.pdf5G NR_optimizing RAN design architecture to support new standards.pdf
5G NR_optimizing RAN design architecture to support new standards.pdf
ssuser5c980e1
 
powerpoint_presentation_-_making_5g_nr_a_reality_february_2020_web.pptx
powerpoint_presentation_-_making_5g_nr_a_reality_february_2020_web.pptxpowerpoint_presentation_-_making_5g_nr_a_reality_february_2020_web.pptx
powerpoint_presentation_-_making_5g_nr_a_reality_february_2020_web.pptx
semua
 
powerpoint_presentation_-_making_5g_nr_a_reality_february_2020_web.pdf
powerpoint_presentation_-_making_5g_nr_a_reality_february_2020_web.pdfpowerpoint_presentation_-_making_5g_nr_a_reality_february_2020_web.pdf
powerpoint_presentation_-_making_5g_nr_a_reality_february_2020_web.pdf
AhmedHashi22
 
WirelessHart location determination application
WirelessHart location determination applicationWirelessHart location determination application
WirelessHart location determination application
Vaibhav Ukarande
 
NB-IoT: a sustainable technology for connecting billions of devices
NB-IoT: a sustainable technology for connecting billions of devicesNB-IoT: a sustainable technology for connecting billions of devices
NB-IoT: a sustainable technology for connecting billions of devices
Ericsson
 

Similar to What IT Professionals Need to Know about Sniffing Wireless Traffic in 2016 (20)

IoT_standards
IoT_standardsIoT_standards
IoT_standards
 
Secure Data Transmission
Secure Data TransmissionSecure Data Transmission
Secure Data Transmission
 
5g architecture.pptx
5g architecture.pptx5g architecture.pptx
5g architecture.pptx
 
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER) International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)
 
5G antenna-Technology
5G antenna-Technology5G antenna-Technology
5G antenna-Technology
 
5G NR_optimizing RAN design architecture to support new standards.pdf
5G NR_optimizing RAN design architecture to support new standards.pdf5G NR_optimizing RAN design architecture to support new standards.pdf
5G NR_optimizing RAN design architecture to support new standards.pdf
 
IoT Connectivity: The Technical & Potential
IoT Connectivity: The Technical & PotentialIoT Connectivity: The Technical & Potential
IoT Connectivity: The Technical & Potential
 
Comparative Study of Lora & Sigfox
Comparative Study of Lora & SigfoxComparative Study of Lora & Sigfox
Comparative Study of Lora & Sigfox
 
5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_Modes5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_Modes
 
Cdma Security
Cdma SecurityCdma Security
Cdma Security
 
powerpoint_presentation_-_making_5g_nr_a_reality_february_2020_web.pptx
powerpoint_presentation_-_making_5g_nr_a_reality_february_2020_web.pptxpowerpoint_presentation_-_making_5g_nr_a_reality_february_2020_web.pptx
powerpoint_presentation_-_making_5g_nr_a_reality_february_2020_web.pptx
 
powerpoint_presentation_-_making_5g_nr_a_reality_february_2020_web.pdf
powerpoint_presentation_-_making_5g_nr_a_reality_february_2020_web.pdfpowerpoint_presentation_-_making_5g_nr_a_reality_february_2020_web.pdf
powerpoint_presentation_-_making_5g_nr_a_reality_february_2020_web.pdf
 
CDMA 2000 Principle Issue4.0
CDMA 2000 Principle Issue4.0CDMA 2000 Principle Issue4.0
CDMA 2000 Principle Issue4.0
 
WirelessHart location determination application
WirelessHart location determination applicationWirelessHart location determination application
WirelessHart location determination application
 
Ic3514231425
Ic3514231425Ic3514231425
Ic3514231425
 
City scale and nationwide LoRa network: deployment challenges, best operating...
City scale and nationwide LoRa network: deployment challenges, best operating...City scale and nationwide LoRa network: deployment challenges, best operating...
City scale and nationwide LoRa network: deployment challenges, best operating...
 
NB-IoT: a sustainable technology for connecting billions of devices
NB-IoT: a sustainable technology for connecting billions of devicesNB-IoT: a sustainable technology for connecting billions of devices
NB-IoT: a sustainable technology for connecting billions of devices
 
NB-IoT: a sustainable technology for connecting billions of devices
NB-IoT: a sustainable technology for connecting billions of devicesNB-IoT: a sustainable technology for connecting billions of devices
NB-IoT: a sustainable technology for connecting billions of devices
 
Overview of Wireless Communications
Overview of Wireless CommunicationsOverview of Wireless Communications
Overview of Wireless Communications
 
Sat4 m2m
Sat4 m2mSat4 m2m
Sat4 m2m
 

More from Priyanka Aash

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

What IT Professionals Need to Know about Sniffing Wireless Traffic in 2016