B


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

backups
     DELETE command, Windows
     encrypting data on
Balfanz, Dirk
Barbi web site, violating informed consent principles
behavioral biometrics
benchmark studies, setting usability goals
benevolence, trustworthiness and
Berson, Jordy
BHOs (Browser Helper Objects), Bugnosis and
binary security model, VPNs
biometric authentication 2nd 3rd 4th 5th 6th
     accessibility factors
         outlier accommodation
     applications for 2nd
     ATMs
     capture
     enrolling users
     face systems
     fingerprint systems 2nd
     flaws in
     handprint systems
     iris systems
     key predictability
     keystroke systems 2nd
         evaluating
         tips for producing reliable results
     market growth in
     memorability of
     portable biometric devices
     privacy/security issues
     remote
     retina systems
     time factor
     users and
         acceptance
     verification techniques
biometrics
BioPassword
Bishop, Matt
Blackwell, Alan
blocks
     on free list, overwriting
bodystorming, interface design
bootstrapping
     iPKIs and
Boyd, Paul
breakability, authentication security
Briggs, Pamela
Bro network-monitoring tool
Brodie, Carolyn
Browser Helper Objects (BHOs), Bugnosis and
Brunk, Benjamin
brute force attacks 2nd
Bugnosis
     architecture
     audience for
     future directions
     graphic identity
     source code
     theory of operation
     user alerts
     web bugs, defining
     web security, user awareness of
bugtraq
bulletin boards, sense of community in
business sector, security breaches in



Security and Usability. Designing Secure Systems that People Can Use
Security and Usability: Designing Secure Systems That People Can Use
ISBN: 0596008279
EAN: 2147483647
Year: 2004
Pages: 295

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net