Index P

only for RuBoard - do not distribute or recompile

Web Security, Privacy & Commerce, 2nd Edition

[Symbol][A][B][C][D][E][F][G][H][I][J][K][L][M][N][O][P][Q][R][S][T][U][V][W][X][Y][Z]

P
 P3P (Platform for Privacy Preferences Project) , 2nd
 base data elements
 compact policies , 2nd
 deploying
 enabled web site, example
 HTTP responses, P3P headers
 Internet Explorer, support by
policy reference files
 well-known locations
 privacy policy, creating
 PrivacySealExample program
 packets
 ACK packets
 acknowledgment or retransmission
 byte count
 displaying text
 DNS requests
 size
 SYN packets
 SYN ACK packets
packet sniffers
 Ethernet interfaces, and
 packet sniffing
 packet switching
 packet-filtering firewalls , 2nd
paper
 shredders for
 throwing out
 parity RAID systems
partitions
 backup by
 root
 passwords , 2nd  , 3rd
 bad passwords, characteristics
 choosing
 classes, bases, and rotation
 good passwords, characteristics
 hit lists of
 ISPs, requirements for
 management, multiple passwords
 nonreusable
 password files, setting up
 password keepers
password sniffers
 protocols, secure against
 sharing of
 spoofing requests for
 theft of
 writing down
 patches
 patents
 patents, cryptographic systems
 PCT (Private Communications Technology) , 2nd
 peering agreements
 PEM certification format, example
 performance
 C programs
 monitoring resources
 Perl programming language
 scripts, filtering
 system function
 tainting
 PERL.EXE and the cgi-bin directory
 personal certificates
 personal information
 ISPs, available to

    See : PII
 personally identifiable information
 personnel, security aspects of
 PGP (Pretty Good Privacy) , 2nd
 digital certificates, and
 document authentication
 DSA algorithm, and
 fraudulent keys
 key certification
 key-pair generation
 keys, certification
 public keys and digital certificates
signatures
 certification
 software signature
 phf script
 phishing (identity theft scams)
 phone charge scams
 physical security
 access control
 of backups
 plan
 physical tokens
 PICS (Platform for Internet Content Selection) , 2nd
 HTTP label requests
 label specification
 MPAA movie-rating example
 name/value pairs
 rating services, label requests from
 RFC 822 header, document labeling with
 PII (personally identifiable information) , 2nd
 ping
 ping of death
 piracy of software , 2nd
 PKI (public key infrastructure) , 2nd
 barriers to development
 PKZIP virus
 plaintext , 2nd

    See : PICS
 Platform for Internet Content Selection

    See : P3P
 Platform for Privacy Preferences Project , 2nd
 plug-ins , 2nd
 history
 installation
 Internet Explorer
 Netscape plug-in security warning
 security aspects
 security concerns
 Polaroid Corporation, identification products
 policy reference files , 2nd
 well-known locations
 policy, security
 pornography and the Internet
 child pornography
 filtering software , 2nd
 portmap service
 portrayal of information in false light
 ports
 SSL on TCP IP
 updating
 POSIX specification, system calls
 Postel, Jon
 power surges , 2nd  , 3rd
 PPP (Point-to-Point Protocol)
 preventing theft
 Princton University Secure Internet Programming group
 print through process
 printer spoolers, security risks
 printers, security risks
 privacy , 2nd
 cookies, and
 digital cash systems
 digital certificates, and
 downloaded software, from
 email and
 JavaScript and
 protecting
 torts
 violations, refer link field
 web browser extensions, from
 Privacy Act of 1974
Privacy Foundation
 web bugs, guidelines for use
 privacy policies
 P3P, deploying
privacy protections
 American business, self regulation
 Canada
 Code of Fair Information Practices
 COPPA
 early US legislation
 European legislation
 European Union
 Fair Credit Reporting Act
 Internet Explorer 6.0, built into
 OECD guidelines
 seal programs
 privacy-protecting technologies
 PrivacySealExample Program
 Private Communications Technology (PCT) , 2nd
 private information
 private keys
 generation and storage
 management
 privileges, CGI scripts and
 profiles
 programmed threats

    See : bugs
programming
 errors
 guidelines for
 references for
 programs that spend money
 Promo Line, Inc.
 proprietary encryption algorithms
 protocols
 proxies
 proxy firewalls
 proxy servers , 2nd
public key cryptography
 algorithms, attacks on
 authentication using SSH
 challenge-response
 digital certificates
 Hushmail
key certification
 Web of Trust
 patents
 PGP, key generation with
 private key management
public key systems
 computational expense
 real-world examples
 replay attacks, preventing
 public keys , 2nd
 cryptographic algorithms
 identification, using for
 PGP
 smart cards, and
 public libraries and anonymous browsing
 public terminals, security risks
 public/private key pairs for web servers
 publicity
 punch-down blocks vs. RJ11 plugs
 purchasing over Internet
only for RuBoard - do not distribute or recompile


Web Security, Privacy & Commerce
Web Security, Privacy and Commerce, 2nd Edition
ISBN: 0596000456
EAN: 2147483647
Year: 2000
Pages: 194

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net