K



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

kernel
     Linux, probing
     UNIX
kernel files, UNIX
Kernel Object Manager (KOM)
Kernel Probe Vulnerability in Linux 2.2 listing (10-1)
key exchange payloads, ISAKMP (Internet Security Association and Key Management Protocol) 2nd
keys, Windows NT registry
     key squatting
     permissions
     predefined keys
kill bit, Active X controls
kill( ) function
Kirch, Olaf
Klima, Vlastimil
KOM (Kernel Object Manager)
Koziol, Jack
Krahmer, Sebastian 2nd
Kuhn, Juan Pablo Martinez




The Art of Software Security Assessment. Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
ISBN: 0321444426
EAN: 2147483647
Year: 2004
Pages: 194

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net