| < Day Day Up > |
|
Note: Italized numbers refer to figures.
/unix/xntp/xntp-src.tar.Z 192
/usr/adm, 611
/V (data verification), 146
/var/adm or /var/log for storage, 611
+host:demon.co.uk and hack*, 75
+host:domain name and hack*, 74
+link:domain name, 75
100Mbit/sec network environments, 586
10-Base-T twisted pair equipment, 439
128-bit message digest 5 (MD5) algorithm, 623
128-bit Secure Sockets Layer (Web encryption), 545–46
1984, George Orwell, 547
1996 U.S. General Accounting Office (GAO) report, 259, 340, 589
1997 Defense Science Board’s threat analysis report, 515
1999 World Trade Organization (WTO) summit, 407
2000 CSI/FBI Computer Crime and Security Survey, 56, 59, 616–17
24 NAVSTAR global positioning system (GPS), 434
2600 Enterprises Inc., 332
2D data visualization modules, 221
32-bit .exe files (PE files), 166
32-bit cyclic redundancy check (CRC) algorithm, 623
3590 drive, 116
3COM Corp., 197
3Com’s Palm Pilot, 416
3D data visualization modules, 221
41-nation Council of Europe, 265–66
911 emergency calls, 443, 447, 471, 475, 482
| < Day Day Up > |
|