[A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z]

caching data
CALEA (Communications Assistance for Law Enforcement Act)
call associated data (CDC)
call content information (CCC)
cameras, closed-circuit
CAPPSII (Computer Assisted Passenger Prescreening System) 2nd
cards (RFID)
Carnivore system (FBI)
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
CAs (certificate authorities) 2nd
CCC (call content information)
CDC (call associated data)
cell phones [See also Bluetooth.]
     cell phone cloners
     cell phone snoopers
     home location register (HLR)
     location tracking
     Paris Hilton case study
     workplace surveillance
certificate authorities (CAs) 2nd
certificates, digital 2nd
China, web blocking and
choke routers
circuit-switched networks
cleaning data
clear to send (CTS)
client/server model
closed-circuit cameras
CODIS (Combined DNA Identification System)
Communications Assistance for Law Enforcement Act (CALEA)
Communications Decency Act
Computer Assisted Passenger Prescreening System (CAPPSII) 2nd
corporate firewalls 2nd
credit cards
     black market credit card money trail
     credit card fraud, detecting
     identity theft
     theft of credit card information
credit repair scams
cryptosystems 2nd
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)
CTS (clear to send)

How Personal & Internet Security Work
How Personal & Internet Security Works
ISBN: 0789735539
EAN: 2147483647
Year: 2004
Pages: 161

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net