Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] languages LANs (Local Area Networks) 2nd 3rd 4th 5th laptops lattice-based access layers (OSI) Layer 1 (Physical) 2nd Layer 2 (Data Link) 2nd 3rd Layer 3 (Network) 2nd Layer 4 (Transport) 2nd 3rd Layer 5 (Session) 2nd 3rd Layer 6 (Presentation) 2nd 3rd Layer 7 (Application) 2nd 3rd table of 2nd liability insurance 2nd life cycle of projects 2nd life cycles SDLC (Software Development Life Cycle) 2nd 3rd Classic Life Cycle Model design 2nd 3rd development 2nd 3rd feasibility 2nd implementation 2nd 3rd Linear Sequential Model programming languages prototyping 2nd RAD (rapid application development) 2nd requirements definition 2nd 3rd Software Capability Maturity Model (CMM) 2nd Waterfall Method 2nd limit checks line management 2nd 3rd Linear Sequential Model lists ACLs (access-control lists) 2nd Local Area Networks (LANs) 2nd 3rd 4th 5th logic bombs logical access controls 2nd 3rd access access paths access-control matrices ACLs (access-control lists) 2nd authentication 2nd 3rd 4th alert thresholds passwords 2nd two-factor (strong) authentication authorization centralized/decentralized discretionary access identification 2nd 3rd 4th lattice-based access MACs (mandatory access controls) 2nd nondiscretionary access 2nd restricted interfaces role-based access rule-based access subjects 2nd task-based access logical relationship checks logical security controls 2nd 3rd |