Technology understanding, 155–57, 378
Threats
denial of service (DoS), 298–99
forgery, 302
information disclosure, 301
mail relay, 302–3
overview, 298
spam, 298, 300–301
spoofing, 302
unauthorized access, 301
viruses, 300–301
See also Security
Torn write, 83
Transacted storage architecture, 156
Transaction logs, 79–81
access order, 80
backing up, 125
defined, 79
design best practice, 62
example contents, 82
files, 79, 80, 81
generation, 80
header format, 81
inside, 81–83
I/O, 79
reserved, 84–85
restoring, 133
truncating, 126
Transactions, 77
Triple-verification strategy, 180
Trustworthy Computing (TWC), 311