Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] back door 2nd backups hints for badges BANs Barlow, John baseband basic service set (BSS) Bell, David 2nd Bell-LaPadula model 2nd 3rd Beneich, Denis Biba model 2nd biometrics 2nd devices fingerprints handprints iris scans keystroke verification overview retina patterns security signature-writing pattern voice verification BLOWFISH bombs Bootstrap Protocol (BOOTP) Bouncing Ball virus Brain virus Breton, Thierry bridge broadband 2nd broadcast networks Brooks Act Brooks Act mandate Brunner, John brute force attack BubbleBoy virus buffer overflow attacks building area networks Burgundy Book buying security government requirements information protection |