Flylib.com
Index_M
Previous page
Table of content
Next page
M
MAC
ACL functionality, 179
address spoofing/circumventing filters, 201 “2
Macro viruses, 217 “18
Malicious code attacks, 71 “72, 217 “20
macro viruses, 217 “18
spyware, 219 “20
Trojan horses, 219
virus incidents, 217
worms, 218 “19
See also
Attacks
Malicious coders, 9
Malicious hackers, 8
Mandatory access control model, 26 “27
MIDP 2.0, 148
MiniStumbler, 196
Misuse, 72
Mobile IP, 258 “60
clients , 258
firewalls and, 259
IP datagrams and, 259
specification, 258
Mobile security, 129 “50
authentication, 137 “38
certificates, 129 “37
code signing, 149
content-based, 138 “39
cryptography toolkits, 141 “47
data, 147 “48
device, 140
device-specific APIs, 147
distributed access control, 140
ubiquity, 137
verification, 149 “50
Multifactor authentication, 301 “2
Multipurpose Internet Mail Extensions (MIME), 102 “3
Previous page
Table of content
Next page
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153
Authors:
John Rittinghouse PhD CISM
,
James F. Ransome PhD CISM CISSP
BUY ON AMAZON
Crystal Reports 9 on Oracle (Database Professionals)
Connectivity, Authentication, and Privileges
PL/SQL
Optimizing: The Crystal Reports Side
Other Tips
The Crystal Repository
Agile Project Management: Creating Innovative Products (2nd Edition)
The Guiding Principles of Agile Project Management
Judgment Required
Practice: Customer Team-Developer Team Interface
Phase: Close
The Commitment-Accountability Protocol
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Introduction
Calling a Superclass Virtual Function
Streams and Files
Working with Polar Coordinates
Notifying One Thread from Another
Network Security Architectures
Applied Knowledge Questions
Applications
Common Application Design Considerations
Identity Design Considerations
Designing Your Security System
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Working with Ideas
Descriptive Statistics and Data Displays
Variation Analysis
Identifying and Verifying Causes
Complexity Value Stream Mapping and Complexity Analysis
Programming .Net Windows Applications
Mouse Interaction
Date and Time Values
Updating ADO.NET
Command Builder
Deployment
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies