Index

 < Day Day Up > 



Note: Italized numbers refer to figures.

Special Characters

/unix/xntp/xntp-src.tar.Z 192

/usr/adm, 611

/V (data verification), 146

/var/adm or /var/log for storage, 611

+host:demon.co.uk and hack*, 75

+host:domain name and hack*, 74

+link:domain name, 75

100Mbit/sec network environments, 586

10-Base-T twisted pair equipment, 439

128-bit message digest 5 (MD5) algorithm, 623

128-bit Secure Sockets Layer (Web encryption), 545–46

1984, George Orwell, 547

1996 U.S. General Accounting Office (GAO) report, 259, 340, 589

1997 Defense Science Board’s threat analysis report, 515

1999 World Trade Organization (WTO) summit, 407

2000 CSI/FBI Computer Crime and Security Survey, 56, 59, 616–17

24 NAVSTAR global positioning system (GPS), 434

2600 Enterprises Inc., 332

2D data visualization modules, 221

32-bit .exe files (PE files), 166

32-bit cyclic redundancy check (CRC) algorithm, 623

3590 drive, 116

3COM Corp., 197

3Com’s Palm Pilot, 416

3D data visualization modules, 221

41-nation Council of Europe, 265–66

911 emergency calls, 443, 447, 471, 475, 482



 < Day Day Up > 



Computer Forensics. Computer Crime Scene Investigation
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
ISBN: 1584500182
EAN: 2147483647
Year: 2002
Pages: 263
Authors: John R. Vacca

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net