Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Q0-Q7 quality levels Quality demands privacy principles and policies software Quantifying security value accurate data attack sources attack types comparability of categories consistent data cost of U.K. security incidents economic impact 2nd 3rd ISBS (Information Security Breeches Survey) 2nd justification data overview reliable data representative data respondent types security practices 2nd timelines Quantum cryptography cryptography with photons implementation overview photon reception polarizing filters quantum physics Quantum physics Queries database Query analysis, database inference |