SlideShare a Scribd company logo
!
!"            #

                             $ %   &

    #       '      ()
                    )*

+ ,                      !

        '
-           '. /




                               2
%   0



                                             !                 "
                        #        $# %                # &       #
         # '                 (                             !       (
          "        )**           %+      ,!               -.           /
        0)         1      2       !                  0
        3            1 44
                        56       !
                        !        768 )96                  6 8 9    !


          "                                          5*
          "         !            )       :       !
               !
         )%+;           *        !               6 8<
            ,!                       "       :
           #
Why BT for Security?

                                             Industry-leading resources
 1,400 global practitioners           Comprehensive event                      Operating 9 world            Over 100 registered patents,
 with over 125 accredited            correlation platforms and                class SOCs globally            190 security papers and
   security professionals                 reporting tools                           24/7/365                     numerous books
         in the US


                                               With proven experience
   6,000 security              BT has delivered                                           Monitoring 550           Filters over 75,000
                              security services to       Over 1,500 firewalls            networks with data
 engagements in the                                                                                                viruses from client
                               over 75% of the           under management             from over 150 countries
   US since 1994                                                                                                  networks each month
                                 Fortune 500                                            and 335,000 devices


                                Delivering an integrated services portfolio
                                                                         Incorporating industry-
                                     From assessment to
                                                                          leading technology &
                                     mitigation, on a global
                                                                       services, with Counterpane
                                              basis
                                                                               at the core


                                                 Third party validation
                                                                                           Many accreditations, including BS
              Leadership position in                     Highest capability                27001/ISO 17799, SAS70-II, FIPS
          Gartner’s 2007 North American                   maturity rating                    140-2, CERT, FIRST, CLAS,
             MSSP Magic Quadrant                            from NSA                                 SANS GIAC
                                                                                                     and CHECK
1
1
           ,
2

1
1   '   3# 4




               5
1


1                 !                       5
    &   ' &                           " % "
              "           "   &               6

                      6
1
                                  6




                              6
1            ! 77
                )


1            !              -           /    & "   &
        !           &                    !             6

            - /                     &
    &                           6

                                    8 0




                        7
1 8 0 9& &

                      -       /
 $                                !           6
 $ 2 , :'
        ;      6
 $                        <
   -)) = => ; ;
   ) =(: 7 = = /
 $
     &            -       /
 $ ?&             "                   &


 $                                        ,   (6:
     .@   ( .@
           6A 6




                              8
18 0


               &

 $ 9
                   ! 6
 $     !
                         ! 6




           9
??? ; ( 7
     ) 67

 ??? ; ($
      )              !        &   ???
    ;( 7
     ) 67
     $ ( .@
        6:
     $ (
    ;( 7
     ) 67
     $ A .@
     $ A:
    ;( 7
     ) 67
     $ ( .@
        6:
     $ 77
    ;( 7
     ) 67
     $ ( .@
        6:
     $ A:
    ;( 7 '
     ) 67
     $ (6:    A .@
     $ B)
        )
                         10
; ( 7& 6 1 '+
 ) 67


 ; ( 7'
  ) 67                                  ???
 1 '+
 $               ;( 7
                 ) 67                         1 '+
 $ 1 '+                 "      '
   B)
    )                                         18 0
 $                          1 '+        !
           &
 1 '+

 $ ?                    &
        1 '+            -
                        1      /
               ;( 7 ,
               ) 67      6

                                   11
!

&       !

<           ! !
    5




                  12
1


    $                    ,
    $
    $       C

    $
    $   !            D




                13
1                          &


                      !$         !
          @   D                  !
1         8 0               6
0                            6
            !     =
    $ 1
    $ +
    $
                                     &   6



                           14
1         ?, &               &   - ? /
                                 1

              !                           6          !    ,       =
    $                            6
    $              6
    $         &        6
E                                             18 0        6
2              :
    $     :                                    '              !
                   F       -F/       6
    $     :                                          <6
2         B'
           (                              !-         B/
                                                      (
    $
    $ 2                          !F           - F/
?&                 " ?
                    1                &
                                     15
1 '+                               -
                                   1              /


 1
 1? 6
 $ 1 !              ;( 7"
                     ) 67          6
 $                                                1? D
 $ ?<                                            G
 8          '                 =1       (6
 1              1 (                                   ??? ; ( 7
                                                           ) 67
 1      '        !  H)                           I
 $     =3
       3        6    6 6 !3    3 &     3)>)3)
                                        ()3;B3           '   '   ' 'H '
                                                                     )    3




                                            16
1


1                                                     "    &
                                           '       ! ! 6
    $ %   &                                    1?
    $ %   &                !- 6
                             6                      1?     /
    $ %   &   +   '        !


1                     1?     =
    $                         ;( J
                               ) 67                  !-        /
                  -           /
    $         !                                !
    $             @           @        &           -F/
    $

                                  17
1       (


                         &          1 '+
                         ???D ; ( 7
                               ) 67
2                                    "'
                                      :       !"
!                    1
                %E               &        ?    -? /

    $   ?            '
    $   ?                !       '            -    '
            /                !




                                     18
1? 4


+                     "
       1?           B")>
                     7()6
+                       "
1?     I    B"))
             )(76




                    19
=            1


"
    ?<


                      ; ( 71 8 0
                       ) 67
    & 6(
     7                         ? &                 - ?/
                                                      6

      &
                  ,          ! 18 0                 &
                        !6
         =3
         3    6              6   3    3   K   K1    K     6

                                 20
?         &                   $                4


                  &                                        6
    $ %               5                                !
              &                                    6
    $         &
                      "                                        & 6
    $
                          "            F   2       " 5
                                                     &     6




                                  21
#                   #
$               3
$                                        !
$                                                !       ?
$           &       '                                &

$   %
$

        &
$           !               &       "
$                                                    18 0
$
$                               '            &
                                    22
0                            !&               6
$               !                                  8 0
        6
    &           "
                             !
$ %
            !                        !6
0 &                 &
$                                            ! "   "
        "   0                    6
0
$                   "                6
$       &                                @             6

                        23
,
$               @                 &                             !
                !&                 !                    6
$                        @
                                                                ?
            6
$                                  @                                6

    ,                                  '                    !
$       ,                         @
                     &                          &   6
$
                "            ?6
$   ,                                       &
    ,            6
                                       24
1       !                                       =
$
$                                         ?6
                             !   &              "
                     !               @
    &                                          ?6
            !                             ,
                         !           ?6




                25
&                     @ -
                        / 8 0
                         1               @   D   !6
                          =
$         18 0                   !   &
$           !        18 0                !
$ &              6




                            26
1



    9                     =
    $       9
    $   9
    $                              - ."   %   " 6/
    $                 3
    $
    $           9
            ?
    $             9       "
                & "



                              27
!$           , 7 6B
                          6 6(


                                  !   ?
$                    -
        /                &            ?6
F
    !
$                -
        /                &            ?6




            28
!

    ,                      !               "
                                       ?       6
        &                  @
        ?&                             !
                                   6
1                 =
$                              !                   ?
              !
$       ;( 7
         ) 67
$
$
          ,           76
                       )


                           29
$   , ( 67
                                            6 67

              &       '
                      !
$        "0                    "
        "                      ! " 6
?                 &
                                                    6
    &                                           &
,                              ,            6




                          30
&   $       , > 6B
                                      6 67


                                 "
    &   6
F                                    "        "
        &                        6
$
$   !
            !            !   &

$           3
$               &




                    31
7 67$ 1
         7                                          !


%
             @
$       ,
$                         3                         &       6
F                                 @                 ,       "
             3
            & 6
                  3                            "&
                                           6
F                 @           D                         - , 7 6>
                                                           6 ( /
$                                              &        @
    &                 6
                                      32
1           3                             $       , 7 6:
                                                   6 7

2           3                    &
                     ?
            6
    $            !
                !
    $                    !                        !

        ,                        6
E
    $           3
                6
    $ ?<        3                             3   &
            "                "        &
                     6
                                 33
#                                                     $       , 7 67
                                                               6 7
%                      "                 "        !                     "
                                                          ,
                        @                         6
2                      @            ,
     &
    $ 7 67%
       7
          @        ,                                          3
               &       6
    $ 7 67 F
       7                            @                     ,         "
               3
        & 6
    $ 7 67
       7                   3                     "&
                               6
    $ 7 67 F
       7                   @    D                                 - ,       7 6>
                                                                             ( /
                               &             @                    &             6
                                    34
'
$ L                    !
$
$
        & 6
(             )
$ .
$             ,   ,        6
$ L                    "       =

                  &            &



                  35
!                   !
$ 8
$ 2         +                   &       +        !
$ 9             ;( 7
                 ) 67


$               !                   !                    1
        1                   &           ! &                  !
                !           !


$ 0
$ ?                 '                                <           &
$                   &
                                            36
1


                                      "       "
        !"#"     "                        $   $ 6
    $                         !           6
    $        '                    !


    $    D           &




                         37
1


              1?
               8?
    $ E       !         !             8?
    $                   8?        "
2 1           1     (
    $     1   (
    $




                             38
1                                  %

0
    $       6                  6                                     6    6
1?               !                                               E
    $       =3
            3             !6                6                        6!       6
            !'      -              '                         /
    $       6        ! 6
                      '                                              6    6
        %       0          !
    $       6                      !6   3

    $                &
    $       6         6            3    3       K        6


                                                    39
40
!
                         6
    &                            6
,                            &
        &
                     &               &
            !




                41
#3 $


       !"   "       "        #

 %      &
  6 ! 6   3 3           !
  6   6 3       !




                        42

More Related Content

What's hot

A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...Acquanews
 
Susceptibilité familiale et éthnique au paludisme
Susceptibilité familiale et éthnique au paludismeSusceptibilité familiale et éthnique au paludisme
Susceptibilité familiale et éthnique au paludisme
Institut Pasteur de Madagascar
 
Document1
Document1Document1
Document1M3y3aM
 
Libro deapoyometminjaresme
Libro deapoyometminjaresmeLibro deapoyometminjaresme
Libro deapoyometminjaresme
adriana barba
 
4. alps computerize motor rewind
4. alps computerize motor rewind4. alps computerize motor rewind
4. alps computerize motor rewind
alpsmsi
 
Aesthetics in Software Testing
Aesthetics in Software TestingAesthetics in Software Testing
Aesthetics in Software Testing
STAG Software Private Limited
 
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเราพัน พัน
 
How To Trust The Cloud
How To Trust The CloudHow To Trust The Cloud
How To Trust The Cloud
Neustar, Inc.
 
Alumnes, Programari I Materials
Alumnes, Programari I MaterialsAlumnes, Programari I Materials
Alumnes, Programari I Materialstinoserracompany
 
How to Trust the Cloud
How to Trust the CloudHow to Trust the Cloud
How to Trust the Cloud
Lenny Rachitsky
 
OECD, Higher education workshop, Helsinki, 2007, Finland
OECD, Higher education workshop, Helsinki, 2007, FinlandOECD, Higher education workshop, Helsinki, 2007, Finland
OECD, Higher education workshop, Helsinki, 2007, FinlandIlkka Kakko
 
Six-Core AMD Opteron launched
Six-Core AMD Opteron launchedSix-Core AMD Opteron launched
Six-Core AMD Opteron launchedYING CHIEH YU
 
Farmer's manual eng
Farmer's manual   engFarmer's manual   eng
Farmer's manual engguestc4cf6a1
 
04 face- nose- palate development
04 face- nose- palate development04 face- nose- palate development
04 face- nose- palate developmentLE HAI TRIEU
 
Data Citation from the perspective of tracking data reuse
Data Citation from the perspective of tracking data reuseData Citation from the perspective of tracking data reuse
Data Citation from the perspective of tracking data reuse
Heather Piwowar
 

What's hot (18)

A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...
 
Susceptibilité familiale et éthnique au paludisme
Susceptibilité familiale et éthnique au paludismeSusceptibilité familiale et éthnique au paludisme
Susceptibilité familiale et éthnique au paludisme
 
Document1
Document1Document1
Document1
 
Libro deapoyometminjaresme
Libro deapoyometminjaresmeLibro deapoyometminjaresme
Libro deapoyometminjaresme
 
4. alps computerize motor rewind
4. alps computerize motor rewind4. alps computerize motor rewind
4. alps computerize motor rewind
 
Aesthetics in Software Testing
Aesthetics in Software TestingAesthetics in Software Testing
Aesthetics in Software Testing
 
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา
 
How To Trust The Cloud
How To Trust The CloudHow To Trust The Cloud
How To Trust The Cloud
 
Alumnes, Programari I Materials
Alumnes, Programari I MaterialsAlumnes, Programari I Materials
Alumnes, Programari I Materials
 
Attività didattiche
Attività didatticheAttività didattiche
Attività didattiche
 
How to Trust the Cloud
How to Trust the CloudHow to Trust the Cloud
How to Trust the Cloud
 
OECD, Higher education workshop, Helsinki, 2007, Finland
OECD, Higher education workshop, Helsinki, 2007, FinlandOECD, Higher education workshop, Helsinki, 2007, Finland
OECD, Higher education workshop, Helsinki, 2007, Finland
 
Six-Core AMD Opteron launched
Six-Core AMD Opteron launchedSix-Core AMD Opteron launched
Six-Core AMD Opteron launched
 
Farmer's manual eng
Farmer's manual   engFarmer's manual   eng
Farmer's manual eng
 
Colegio Nº 1 - Martín de Moussy
Colegio Nº 1 - Martín de MoussyColegio Nº 1 - Martín de Moussy
Colegio Nº 1 - Martín de Moussy
 
Bs 01
Bs 01Bs 01
Bs 01
 
04 face- nose- palate development
04 face- nose- palate development04 face- nose- palate development
04 face- nose- palate development
 
Data Citation from the perspective of tracking data reuse
Data Citation from the perspective of tracking data reuseData Citation from the perspective of tracking data reuse
Data Citation from the perspective of tracking data reuse
 

Viewers also liked

Estatísticas do Security Leaders 2010
Estatísticas do Security Leaders 2010Estatísticas do Security Leaders 2010
Estatísticas do Security Leaders 2010
Gabriela Makhoul
 
Grid connected pv system using 9 level flying capacitor multilevel inverter
Grid connected pv system using 9 level flying capacitor multilevel inverterGrid connected pv system using 9 level flying capacitor multilevel inverter
Grid connected pv system using 9 level flying capacitor multilevel inverter
IAEME Publication
 
Dekho security overview
Dekho security overviewDekho security overview
Dekho security overview
jpradeep1982
 
This Is It
This Is ItThis Is It
This Is ItJon
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
Barry Feldman
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
Helge Tennø
 
Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...
Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...
Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...
Dana Gardner
 

Viewers also liked (7)

Estatísticas do Security Leaders 2010
Estatísticas do Security Leaders 2010Estatísticas do Security Leaders 2010
Estatísticas do Security Leaders 2010
 
Grid connected pv system using 9 level flying capacitor multilevel inverter
Grid connected pv system using 9 level flying capacitor multilevel inverterGrid connected pv system using 9 level flying capacitor multilevel inverter
Grid connected pv system using 9 level flying capacitor multilevel inverter
 
Dekho security overview
Dekho security overviewDekho security overview
Dekho security overview
 
This Is It
This Is ItThis Is It
This Is It
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 
Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...
Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...
Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...
 

Similar to Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance

设计的约定
设计的约定设计的约定
设计的约定
chen meng
 
Dramatically increase revenue on verio template
Dramatically increase revenue on verio templateDramatically increase revenue on verio template
Dramatically increase revenue on verio templateJanine Soika
 
Developer Tools, Nokia Platforms Santtu Ahonen
Developer Tools, Nokia Platforms Santtu AhonenDeveloper Tools, Nokia Platforms Santtu Ahonen
Developer Tools, Nokia Platforms Santtu Ahonen
Ashley Walker
 
EB-85 A
EB-85 AEB-85 A
Low Carbon Housing for Non-experts
Low Carbon Housing for Non-expertsLow Carbon Housing for Non-experts
Low Carbon Housing for Non-experts
urbed
 
Science Fiction Sensor Networks
Science Fiction Sensor NetworksScience Fiction Sensor Networks
Science Fiction Sensor Networks
Diego Pizzocaro
 
Km Zonalito Feb 2010
Km Zonalito Feb 2010Km Zonalito Feb 2010
Km Zonalito Feb 2010
guest69ba7b
 
Investment in the Silicon Valley Mobile Industry
Investment in the Silicon Valley Mobile IndustryInvestment in the Silicon Valley Mobile Industry
Investment in the Silicon Valley Mobile Industrykateimbach
 
Development Made Simple with no Coding: Developing Reusable Business Components
Development Made Simple with no Coding: Developing Reusable Business ComponentsDevelopment Made Simple with no Coding: Developing Reusable Business Components
Development Made Simple with no Coding: Developing Reusable Business Components
dsingleterry
 
ApacheCon NA11 - Apache Celix, Universal OSGi?
ApacheCon NA11 - Apache Celix, Universal OSGi?ApacheCon NA11 - Apache Celix, Universal OSGi?
ApacheCon NA11 - Apache Celix, Universal OSGi?abroekhuis
 
Архитектура коммутаторов Cisco Catalyst 6500
Архитектура коммутаторов Cisco Catalyst 6500Архитектура коммутаторов Cisco Catalyst 6500
Архитектура коммутаторов Cisco Catalyst 6500Cisco Russia
 
LAMP_TRAINING_SESSION_6
LAMP_TRAINING_SESSION_6LAMP_TRAINING_SESSION_6
LAMP_TRAINING_SESSION_6
umapst
 
All about Apache ACE
All about Apache ACEAll about Apache ACE
All about Apache ACE
OSGi User Group France
 
Ipad gump
Ipad gumpIpad gump
Ipad gump
Tuany Beiram
 
OSGI workshop - Become A Certified Bundle Manager
OSGI workshop - Become A Certified Bundle ManagerOSGI workshop - Become A Certified Bundle Manager
OSGI workshop - Become A Certified Bundle Manager
Skills Matter
 
Coanda Effect UAV
Coanda Effect UAVCoanda Effect UAV
Coanda Effect UAV
Naudin Jean-Louis
 
Self-Adaptation of Online Recommender Systems via Feed-Forward Controllers
Self-Adaptation of Online Recommender Systems via Feed-Forward ControllersSelf-Adaptation of Online Recommender Systems via Feed-Forward Controllers
Self-Adaptation of Online Recommender Systems via Feed-Forward Controllers
FET AWARE project - Self Awareness in Autonomic Systems
 

Similar to Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance (20)

Pilot Interim Results
Pilot Interim ResultsPilot Interim Results
Pilot Interim Results
 
设计的约定
设计的约定设计的约定
设计的约定
 
Dramatically increase revenue on verio template
Dramatically increase revenue on verio templateDramatically increase revenue on verio template
Dramatically increase revenue on verio template
 
Developer Tools, Nokia Platforms Santtu Ahonen
Developer Tools, Nokia Platforms Santtu AhonenDeveloper Tools, Nokia Platforms Santtu Ahonen
Developer Tools, Nokia Platforms Santtu Ahonen
 
Lenz Karte
Lenz KarteLenz Karte
Lenz Karte
 
EB-85 A
EB-85 AEB-85 A
EB-85 A
 
Low Carbon Housing for Non-experts
Low Carbon Housing for Non-expertsLow Carbon Housing for Non-experts
Low Carbon Housing for Non-experts
 
Science Fiction Sensor Networks
Science Fiction Sensor NetworksScience Fiction Sensor Networks
Science Fiction Sensor Networks
 
Km Zonalito Feb 2010
Km Zonalito Feb 2010Km Zonalito Feb 2010
Km Zonalito Feb 2010
 
Investment in the Silicon Valley Mobile Industry
Investment in the Silicon Valley Mobile IndustryInvestment in the Silicon Valley Mobile Industry
Investment in the Silicon Valley Mobile Industry
 
Development Made Simple with no Coding: Developing Reusable Business Components
Development Made Simple with no Coding: Developing Reusable Business ComponentsDevelopment Made Simple with no Coding: Developing Reusable Business Components
Development Made Simple with no Coding: Developing Reusable Business Components
 
Javaee glassfish jcertif2010
Javaee glassfish jcertif2010Javaee glassfish jcertif2010
Javaee glassfish jcertif2010
 
ApacheCon NA11 - Apache Celix, Universal OSGi?
ApacheCon NA11 - Apache Celix, Universal OSGi?ApacheCon NA11 - Apache Celix, Universal OSGi?
ApacheCon NA11 - Apache Celix, Universal OSGi?
 
Архитектура коммутаторов Cisco Catalyst 6500
Архитектура коммутаторов Cisco Catalyst 6500Архитектура коммутаторов Cisco Catalyst 6500
Архитектура коммутаторов Cisco Catalyst 6500
 
LAMP_TRAINING_SESSION_6
LAMP_TRAINING_SESSION_6LAMP_TRAINING_SESSION_6
LAMP_TRAINING_SESSION_6
 
All about Apache ACE
All about Apache ACEAll about Apache ACE
All about Apache ACE
 
Ipad gump
Ipad gumpIpad gump
Ipad gump
 
OSGI workshop - Become A Certified Bundle Manager
OSGI workshop - Become A Certified Bundle ManagerOSGI workshop - Become A Certified Bundle Manager
OSGI workshop - Become A Certified Bundle Manager
 
Coanda Effect UAV
Coanda Effect UAVCoanda Effect UAV
Coanda Effect UAV
 
Self-Adaptation of Online Recommender Systems via Feed-Forward Controllers
Self-Adaptation of Online Recommender Systems via Feed-Forward ControllersSelf-Adaptation of Online Recommender Systems via Feed-Forward Controllers
Self-Adaptation of Online Recommender Systems via Feed-Forward Controllers
 

More from Ben Rothke

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
Ben Rothke
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
Ben Rothke
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Ben Rothke
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
Ben Rothke
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
Ben Rothke
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
Ben Rothke
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
Ben Rothke
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
Ben Rothke
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
Ben Rothke
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
Ben Rothke
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligatt
Ben Rothke
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
Ben Rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
Ben Rothke
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practicesBen Rothke
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010
Ben Rothke
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
Ben Rothke
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
Ben Rothke
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
Ben Rothke
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
Ben Rothke
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
Ben Rothke
 

More from Ben Rothke (20)

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligatt
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance

  • 1. !
  • 2. !" # $ % & # ' () )* + , ! ' - '. / 2
  • 3. % 0 ! " # $# % # & # # ' ( ! ( " )** %+ ,! -. / 0) 1 2 ! 0 3 1 44 56 ! ! 768 )96 6 8 9 ! " 5* " ! ) : ! ! )%+; * ! 6 8< ,! " : #
  • 4. Why BT for Security? Industry-leading resources 1,400 global practitioners Comprehensive event Operating 9 world Over 100 registered patents, with over 125 accredited correlation platforms and class SOCs globally 190 security papers and security professionals reporting tools 24/7/365 numerous books in the US With proven experience 6,000 security BT has delivered Monitoring 550 Filters over 75,000 security services to Over 1,500 firewalls networks with data engagements in the viruses from client over 75% of the under management from over 150 countries US since 1994 networks each month Fortune 500 and 335,000 devices Delivering an integrated services portfolio Incorporating industry- From assessment to leading technology & mitigation, on a global services, with Counterpane basis at the core Third party validation Many accreditations, including BS Leadership position in Highest capability 27001/ISO 17799, SAS70-II, FIPS Gartner’s 2007 North American maturity rating 140-2, CERT, FIRST, CLAS, MSSP Magic Quadrant from NSA SANS GIAC and CHECK
  • 5. 1 1 , 2 1 1 ' 3# 4 5
  • 6. 1 1 ! 5 & ' & " % " " " & 6 6 1 6 6
  • 7. 1 ! 77 ) 1 ! - / & " & ! & ! 6 - / & & 6 8 0 7
  • 8. 1 8 0 9& & - / $ ! 6 $ 2 , :' ; 6 $ < -)) = => ; ; ) =(: 7 = = / $ & - / $ ?& " & $ , (6: .@ ( .@ 6A 6 8
  • 9. 18 0 & $ 9 ! 6 $ ! ! 6 9
  • 10. ??? ; ( 7 ) 67 ??? ; ($ ) ! & ??? ;( 7 ) 67 $ ( .@ 6: $ ( ;( 7 ) 67 $ A .@ $ A: ;( 7 ) 67 $ ( .@ 6: $ 77 ;( 7 ) 67 $ ( .@ 6: $ A: ;( 7 ' ) 67 $ (6: A .@ $ B) ) 10
  • 11. ; ( 7& 6 1 '+ ) 67 ; ( 7' ) 67 ??? 1 '+ $ ;( 7 ) 67 1 '+ $ 1 '+ " ' B) ) 18 0 $ 1 '+ ! & 1 '+ $ ? & 1 '+ - 1 / ;( 7 , ) 67 6 11
  • 12. ! & ! < ! ! 5 12
  • 13. 1 $ , $ $ C $ $ ! D 13
  • 14. 1 & !$ ! @ D ! 1 8 0 6 0 6 ! = $ 1 $ + $ & 6 14
  • 15. 1 ?, & & - ? / 1 ! 6 ! , = $ 6 $ 6 $ & 6 E 18 0 6 2 : $ : ' ! F -F/ 6 $ : <6 2 B' ( !- B/ ( $ $ 2 !F - F/ ?& " ? 1 & 15
  • 16. 1 '+ - 1 / 1 1? 6 $ 1 ! ;( 7" ) 67 6 $ 1? D $ ?< G 8 ' =1 (6 1 1 ( ??? ; ( 7 ) 67 1 ' ! H) I $ =3 3 6 6 6 !3 3 & 3)>)3) ()3;B3 ' ' ' 'H ' ) 3 16
  • 17. 1 1 " & ' ! ! 6 $ % & 1? $ % & !- 6 6 1? / $ % & + ' ! 1 1? = $ ;( J ) 67 !- / - / $ ! ! $ @ @ & -F/ $ 17
  • 18. 1 ( & 1 '+ ???D ; ( 7 ) 67 2 "' : !" ! 1 %E & ? -? / $ ? ' $ ? ! ' - ' / ! 18
  • 19. 1? 4 + " 1? B")> 7()6 + " 1? I B")) )(76 19
  • 20. = 1 " ?< ; ( 71 8 0 ) 67 & 6( 7 ? & - ?/ 6 & , ! 18 0 & !6 =3 3 6 6 3 3 K K1 K 6 20
  • 21. ? & $ 4 & 6 $ % 5 ! & 6 $ & " & 6 $ " F 2 " 5 & 6 21
  • 22. # # $ 3 $ ! $ ! ? $ & ' & $ % $ & $ ! & " $ 18 0 $ $ ' & 22
  • 23. 0 !& 6 $ ! 8 0 6 & " ! $ % ! !6 0 & & $ ! " " " 0 6 0 $ " 6 $ & @ 6 23
  • 24. , $ @ & ! !& ! 6 $ @ ? 6 $ @ 6 , ' ! $ , @ & & 6 $ " ?6 $ , & , 6 24
  • 25. 1 ! = $ $ ?6 ! & " ! @ & ?6 ! , ! ?6 25
  • 26. & @ - / 8 0 1 @ D !6 = $ 18 0 ! & $ ! 18 0 ! $ & 6 26
  • 27. 1 9 = $ 9 $ 9 $ - ." % " 6/ $ 3 $ $ 9 ? $ 9 " & " 27
  • 28. !$ , 7 6B 6 6( ! ? $ - / & ?6 F ! $ - / & ?6 28
  • 29. ! , ! " ? 6 & @ ?& ! 6 1 = $ ! ? ! $ ;( 7 ) 67 $ $ , 76 ) 29
  • 30. $ , ( 67 6 67 & ' ! $ "0 " " ! " 6 ? & 6 & & , , 6 30
  • 31. & $ , > 6B 6 67 " & 6 F " " & 6 $ $ ! ! ! & $ 3 $ & 31
  • 32. 7 67$ 1 7 ! % @ $ , $ 3 & 6 F @ , " 3 & 6 3 "& 6 F @ D - , 7 6> 6 ( / $ & @ & 6 32
  • 33. 1 3 $ , 7 6: 6 7 2 3 & ? 6 $ ! ! $ ! ! , 6 E $ 3 6 $ ?< 3 3 & " " & 6 33
  • 34. # $ , 7 67 6 7 % " " ! " , @ 6 2 @ , & $ 7 67% 7 @ , 3 & 6 $ 7 67 F 7 @ , " 3 & 6 $ 7 67 7 3 "& 6 $ 7 67 F 7 @ D - , 7 6> ( / & @ & 6 34
  • 35. ' $ L ! $ $ & 6 ( ) $ . $ , , 6 $ L " = & & 35
  • 36. ! ! $ 8 $ 2 + & + ! $ 9 ;( 7 ) 67 $ ! ! 1 1 & ! & ! ! ! $ 0 $ ? ' < & $ & 36
  • 37. 1 " " !"#" " $ $ 6 $ ! 6 $ ' ! $ D & 37
  • 38. 1 1? 8? $ E ! ! 8? $ 8? " 2 1 1 ( $ 1 ( $ 38
  • 39. 1 % 0 $ 6 6 6 6 1? ! E $ =3 3 !6 6 6! 6 !' - ' / $ 6 ! 6 ' 6 6 % 0 ! $ 6 !6 3 $ & $ 6 6 3 3 K 6 39
  • 40. 40
  • 41. ! 6 & 6 , & & & & ! 41
  • 42. #3 $ !" " " # % & 6 ! 6 3 3 ! 6 6 3 ! 42