[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Y] [Z] Daemon9 data and data management, separating data cleansing Day, Ryab Finnin de Raadt, Theo deception, reliance on default accounts attack default actions and values defense, multiple layers of defenses against attacks degradation [See graceful degradation] democratic principles, maintaining denial-of-service attack 2nd deployment environment, analyzing design decisions design reviews design, good practices design-level attacks desk checks Dijkstra, Edgar 2nd Dilger, Michael DMZ nomenclature Dole, Bryn Du, Wenliang due diligence review from hell, case study dumping core |