G



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

F1-F10 functionality classes
Fabrications
Face recognition authentication [See also Biometrics.]
Factoring large numbers 2nd
Failover mode
Failure 2nd
Failure modes and effects analysis (FMEA) 2nd
Fair Credit Reporting Act
Fair information policies 2nd
Fair service guarantee
Fair use
Fairbrother, Peter
FAIS (Foreign Affairs Information System)
False intrusion detection
False positives
Falsifying messages
Fame, attack motive
Fault tolerance, networks
Fault tree analysis (FTA) 2nd
Faults
     active detection
     definition
     fixing
     passive detection
Faux environment
FBI
     al Qaeda computer
     breaking WEP
     Computer Crime and Security Survey 2nd
     loss from attacks
     organized crime
     stolen laptops
     survey of cyberattacks
     value of cybersecurity
Federal Educational Rights and Privacy Act
Federal Trade Commission (FTC)
Federated databases
Felten, Edward
Fence register
Fences
Fermat's theorem
Field checks, databases
Fields, databases
File lock channel
File names, iishack problem
File protection
     all-none
     group
     individual permissions
     per-object
     per-user
     persistent permissions
     SUID (set userid)
     temporary acquired permissions
Files
    access control [See Access control.]
     directory access
     erasing deleted 2nd
Filters
     database reliability
     multilevel databases
     polarizing
Final permutation 2nd
fingerd flaw 2nd
Fingerprint authentication [See also Biometrics.]
Fingerprint, operating system or applications
Fires
Firewalls
     network encryption
     networks
         application proxy gateway
         authentication
         comparison of
         definition
         design
         guards
         limitations
         overview
         packet filtering gateway
         personal
         sample configuration
         stateful inspection
         types of
     rules set
Firmware, legal issues
First sale
Flaws
     aliasing
     ambiguous access policies
     authentication
     boundary conditions
     definition
     domain errors
     exploitation examples
     identification
     incomplete mediation
     known vulnerabilities
     logic errors
     overview
     serialization
     time-of-check to time-of-use flaws
     types of
     typical flaws
     user interface vulnerability
     validation errors
Floods
Flow analysis
FMEA (failure modes and effects analysis) 2nd
Follett, Ken
Footprints, satellite broadcast
Foreign Affairs Information System (FAIS)
Forgery 2nd
Formal methods
Formal verification
Format failures
Fortezza [See also Keys (encryption) escrow.]
Frames, network
Framing the issue
Fraud
     Computer Fraud and Abuse Act
     ethical issues
     laws
Free rides
Free speech, and cryptography
Freedom of Information Act
Frequency probability
Front end
     databases
     trusted
FTA (fault tree analysis) 2nd
FTC (Federal Trade Commission)
Full disclosure
Full plaintext attacks
Functional correctness
Future earnings, adjusting




Security in Computing
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2006
Pages: 171

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net