[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Y] [Z] Maganty, Vivekananda Maguire, Steve maliciousness man-in-the-middle attack Mayan temple model McConnell, Steve 2nd McGraw, Gary 2nd 3rd mental model Mayan temple example use of metaphors that assist in designing security metrics and security Miller, Barton P. 2nd Miller, Todd C. mission creep modularizing case study Montgolfiers versus Wrights mouse driver security, case study Mudge multilevel security (MLS) multiple layers of security, deploying Murthy, Ravi |