Index C

only for RuBoard - do not distribute or recompile

Web Security, Privacy & Commerce, 2nd Edition

[Symbol][A][B][C][D][E][F][G][H][I][J][K][L][M][N][O][P][Q][R][S][T][U][V][W][X][Y][Z]

C
 C language, programming guidelines

    See : csh
 C shell
 cables, network , 2nd
 routing of
 tampering detectors for
 wiretapping
 CAPI (Cryptographic API)
 carbon monoxide
 Card Shark
 CAs (certification authorities) , 2nd  , 3rd
 certificates for
 certificates, included in browsers, inconsistencies
 certificates, obtaining from
 competition of
 creating for Apache web servers
 history
 multiple certificates offered by
 need for
 private keys, protections of
 quality control problems of
 RSA Certification Services
 types of services
 X.509 v3 certificates
 CDA (Communications Decency Act)
 CDP (CRL distribution point)
 ceilings, dropped
 cellular telephones
 censorship

    See : filtering software
 censorware
 CERN (European Laboratory for Particle Physics)
 CERT (Computer Emergency Response Team) , 2nd
 CERT/CC, PGP signature
 Cert2SPC.exe
 Certificate Requests
 certificate stores
 certificates , 2nd  , 3rd
 certification authorities, for
 client-side
 managing users with
 obtaining from CAs
 renewing
 revoking
 short expiration times
 software publisher s
 SSL, causes of invalidation in
 VeriSign Digital ID Center
 web servers under SSL
 CertificateVerify message

    See : CAs
 certification authorities
 certification of public keys
 CertMgr.exe
 CGI (Common Gateway Interface) , 2nd
 example script
 extensibility of
 programming guidelines
 programs to exclude from
 cgi-bin directory
 challenge-response
 change detection tools
 ChangeCipherSpec
 characters, filtering
 charga-plates
 charge-backs
 charge slips
 chargen utility
 Chaum, David
check digit algorithm
 Perl encoding
 check digits
 CheckFree services

    See : verification
 checking
 child pornography
 Children s Internet Protection Act , 2nd

    See : COPPA
 Children s Privacy Protection Act
 ChkTrust.exe
 chosen plaintext attacks
 chrootuid daemon
 CIAC (Computer Incident Advisory Capability)

    See : encryption
 ciphers
 circular hunting
 Clark, Jim
 class loader, Java , 2nd
 clear GIFs
 client certificates
 'client-sniffing' code
 client/server model
 ClientHello
 clients
 client-side digital certificates
 Clipper chip , 2nd
 CLSID (Class Identifier)
 COCOM (Coordinating Committee for Multilateral Export Controls)
 Code of Fair Information Practices
 code signing
 Authenticode
 current systems
 DSig
 PGP, with
 vulnerabilities
 cold, impact on hardware
commerce
 identification and
 Internet-based payment systems
 merchant fees
 reverse charge transactions
 Communications Decency Act (CDA)
 compact policies , 2nd
 computer failure
 computer forensics
 computer networks , 2nd
 computer security
 physical
 references for
 unattended systems
 Computer Security Resource Clearinghouse (CSRC)
 computer theft, preventing
 laptop locks
 precautions
 recovery software and services
 tagging
 computer vacuums

    See : vandalism
 computer vandalism

    See : worms
 computer worms
 computers, environmental threats to
 Computrace
 confidentiality
 configuration files
 confiscation of property
 connectors, network
 consistency checking
content types
 application/pics-labels
 application/pics-service , 2nd
 content updating
 contingency planning
 continuity of identification
 cookies
 applications
 cookie jars
 crushing
 disabling
 implementation and uses
 Internet Explorer 6.0, and
 privacy, and
 profiles, creating with
 protocol
removal
 Netscape Navigator, from
 RFC 2109
 secure generation and decoding
 security
 security advantages over hidden fields
 third-party cookies
 cookies.txt file
 COPPA (Children s Online Privacy Protection Act)
 exceptions
 FTC, and
 jurisdiction
 parental consent, and
 provisions
 copper network cables, routing of
 COPS (Computer Oracle and Password System)
 copy protection systems
 copyright
 email forwarding, and
 infringement
 core dumps, security of
 core files
 corporations
 Council of Better Business Bureaus, BBBOnLine
 Council of Europe
 courtesy cards
 CPS (certification practices statement)
 maintenance, problems with
 viewing
 CPU attacks
 CPU time limits
 crackers, profiles of
 Cranor, Lorrie
 credit
 history
 credit card sniffers
 credit cards , 2nd
 authentication mechanisms
 check digits
 evaluating system for
 fees
 Internet, usage on
 SET protocol for
 United States, use in
 credit reports, monitoring
 crimes
 criminal laws
 CRL (certificate revocation list)
 crushing cookies
 cryptanalysis
 Crypto Law Survey
 cryptographic protocols
 offline
 online
 cryptographic systems
 strength
 cryptographically enabled web servers
 cryptography
 applications
 attacks against
 domestic use restrictions
 dual signatures
 export controls, and
 government regulation of
 history
 import/export restrictions
 international agreements
 Internet, use in securing
 legal restrictions
 limitations
 message digests
 patents
 public keys , 2nd
 roles in information systems
 securing information sent to web applications
 symmetric key algorithms
 trade secret laws
 csh (C shell), autologout variable
 .cshrc file
 CSRC (Computer Security Resource Clearinghouse)
 custom software
 cvsup command
 CyberCash system

    See : crime
 cybercrime
only for RuBoard - do not distribute or recompile


Web Security, Privacy & Commerce
Web Security, Privacy and Commerce, 2nd Edition
ISBN: 0596000456
EAN: 2147483647
Year: 2000
Pages: 194

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net