O


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

objectives
        of information security
                protecting availability 2nd 3rd
                protecting confidentiality 2nd
                protecting integrity 2nd
        security
offline storage [See also storage]
one-time passwords
one-way function (OWF)
Open Systems Interconnect
OpenHack
operating systems
        Windows [See also Microsoft; Windows operating system]
optimization
        passwords
                accoutn lockout
                disabling LM hashes 2nd
                policies
                protecting cached credentials 2nd
                selection 2nd 3rd 4th 5th 6th 7th
options
       authentication
                SQL Servers 2nd
OS
        version information 2nd
OSI (Open Systems Interconnect) model
outbound connections, preventing 2nd
Outlook Web Access (OWA)
overflows
       buffers
                troubleshooting 2nd
OWA (Outlook Web Access)
OWASP project (http://www.owasp.org)
OWF (one-way function)



Protect Your Windows Network From Perimeter to Data
Protect Your Windows Network: From Perimeter to Data
ISBN: 0321336437
EAN: 2147483647
Year: 2006
Pages: 219

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net