D



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Daemen, Joan
data access controls
data and voice communications, history of
data authentication algorithm (DAA)
Data Encryption Standard (DES) 2nd 3rd
     application of
     Cipher Block Chaining (CBC)
     Cipher Feedback (CFB)
     ECB (Electronic Codebook)
     Output Feedback (OFB)
     what is
data import and export
data modification
data navigation protocols
     attacks
data protection
day-to-day system administration 2nd
     backups
         hints for
     hardware and software security tools
     security audit
DEAL
     Richard Outerbridge, Lars Knudsen
decibel (dB)
deciphering
decryption
dedicated circuits
Deep Crack
default accounts
Defense Advanced Research Projects Agency (DARPA) 2nd
Defense Authorization Act
denial of service 2nd
denial of service attack (DoS) 2nd
Department of Defense
Department of Energy
Department of Homeland Security 2nd
Department of the Treasury
design documentation
DESX
device labels
Dewdney, A.K.
DFC
DIAMETER 2nd
DIAMOND2
dictionary attack
Diffie, Whitfield
Diffie-Hellman public key system
Digital Equipment Corporation's DECnet and Digital Network Architecture (DNA)
Digital Signature Standard (DSS)
digital signatures 2nd
director
directory services
     Active Directory
     Lightweight Directory Access Protocol (LDAP)
     X.500
disaster, planning for
discretionary access control (DAC) 2nd 3rd
     ownership
     self/group/public controls
dish antenna
distributed denial of service
distributed denial of service attack (DDoS) 2nd
division multiplexing (TDM)
Domain Name Service (DNS)
     vulnerabilities
dormant accounts
Dynamic Host Configuration Protocol (DHCP) 2nd




Computer Security Basics
Computer Security Basics
ISBN: 0596006691
EAN: 2147483647
Year: 2004
Pages: 121

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net