B



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

back door 2nd
backups
     hints for
badges
BANs
Barlow, John
baseband
basic service set (BSS)
Bell, David 2nd
Bell-LaPadula model 2nd 3rd
Beneich, Denis
Biba model 2nd
biometrics 2nd
     devices
     fingerprints
     handprints
     iris scans
     keystroke verification
     overview
     retina patterns
     security
     signature-writing pattern
     voice verification
BLOWFISH
bombs
Bootstrap Protocol (BOOTP)
Bouncing Ball virus
Brain virus
Breton, Thierry
bridge
broadband 2nd
broadcast networks
Brooks Act
Brooks Act mandate
Brunner, John
brute force attack
BubbleBoy virus
buffer overflow attacks
building area networks
Burgundy Book
buying security
     government requirements
     information protection




Computer Security Basics
Computer Security Basics
ISBN: 0596006691
EAN: 2147483647
Year: 2004
Pages: 121

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net