Index S

only for RuBoard - do not distribute or recompile

Web Security, Privacy & Commerce, 2nd Edition

[Symbol][A][B][C][D][E][F][G][H][I][J][K][L][M][N][O][P][Q][R][S][T][U][V][W][X][Y][Z]

S
 S/Key system
 S/MIME (Secure/MIME)
 safeWeb
 Triangle Boy service
 sandbox, Java
 sanitizing media
 SATAN , 2nd
 saving backup media , 2nd
 scp program
screen savers
 password-protected
screensavers
 security risks
 script kiddies
 scripts , 2nd  , 3rd
 breaking
 using time-outs
 writing in security
 search warrants , 2nd
 secret key algorithms
 secrets
 Secure Electronic Transaction (SET) , 2nd
 secure email
 Secure Hash Algorithms (SHA, SHA-1)
 Secure Shell (SSH)

    See : SSL
 Secure Sockets Layer , 2nd
 Secure Tracking of Office Property
 secure tunneling
 secure web servers
 Secure/MIME
 securing the web server
 security
 against eavesdropping
 design principles
 disabling cookies
 evaluating credit card systems
 evaluating site security
 holograms
 intrusion detection programs
 message digests
 policies, implementing
 programming guidelines
 protecting backups
 servers physical environment
 web applications, and
security holes
 mailing list for
 security mailing lists
 security perimeter
security plan
 confidentiality of
 security policies, Java
security risks
 data storage
 function keys
 personnel
 real world examples
 single-user boot up
 vendor supplied screensavers
 X Windows terminals
 security tools
 security zones
 SecurityManager class (Java)

    See : detectors
 sensors
 sequence conditions
 server certificates
 server key exchange message
 ServerHello
 servers
 access to
 log files
 physical security of
 proxy
 services, minimizing
 session cookies
 session hijacking
 session keys
 SET (Secure Electronic Transaction) protocol , 2nd
 Set-Cookie header
 SetReg.exe
 settlement
 setuid( ) and setgid( )
 sexygirls.com
 SHA, SHA-1 (Secure Hash Algorithms)
 Shamir, Adi
 shell scripts
 Shockwave
 plug-in
 shredders , 2nd
 signature authentication with PGP
 SignCode.exe , 2nd
 command line operation
 Sims, Joe
 single-user boot up
 SIP (Secure Internet Programming) group
 site exclusion lists
 site inspection
site security
 evaluating
 SLAs (Service Level Agreements)
 smart cards , 2nd
 smart cards and public keys
 smoke, effects on computer equipment
 'Snake Oil' self-signed certificate
 snapshots
 social engineering , 2nd
 employee phonebooks, and
 social engineering attacks , 2nd
 SOCKS
software
 custom
 free
 liability
 for monitoring
 patents
 piracy
 publishing , 2nd
 software failure
 software key escrow
 software patents
 software piracy
 Software Publisher s Pledge
 Software Publishers Association (SPA)
 software publishing certificates , 2nd
 obtaining
 SomarSoft
 source address
 SPA (Software Publishers Association)
spam
preventing
 anti-spam software and services
 Spam Exterminator
 SpamCop
 SpammerSlammer
 spies
spoofing
 DNS spoofing
 forgery-proof identification
 spoofing attacks , 2nd  , 3rd
 sprinkler systems , 2nd
 SRI-NIC
 SSH (Secure Shell) , 2nd  , 3rd
 nonce challenge
 public key authentication
 RSA authentication
 viewing the key
 ssh-keygen program
 SSL (Secure Sockets Layer) , 2nd  , 3rd
 browser alerts
 browser preferences
 certificates, format
 certificates, installation on IIS
 certificates, supported
 history of
 implementations of
 invalid certificates, causes of
 invention by Netscape
 Java, support in
 key-caching
 MD5, use of
 NSS
 open source programs, online resources
 OpenSSL
 performance
 RSA public key algorithm, and
 security deficits
 server addresses,checking
 server certificates, deploying
servers
 supporting packages
 SSLRef
 TCP IP, ports used on top of
 transparency to user
 Unix daemons, adding encryption to
 Version 3.0
web server
 VirtualHost
 SSL Hello
 SSL/TLS , 2nd  , 3rd
 alerts
 ChangeCipherSpec protocol
 compression support
handshake protocol
 ServerHello
 online resources
 protocols
 SSLeay , 2nd
 sslwrap program
 stack attacks
 static audits
 static electricity
 static IP addresses

    See : theft
 stolen property
 stolen usernames and passwords
 storage
 storing private keys
 stream algorithms
 strength of cryptographic systems
 strength, cryptographic
 string command
 strings(1) command
 striping
 subject.commonName field, wildcards
 substitution ciphers
 SUID and SGID privileges
Sun Java SDK
 code signing system
 Sun Microsystems
 Superincreasing Knapsack Problem
 Surety Technologies, Inc.
 surge suppressors

    See : power surges
 surges
 Swatch program
 SymLinksIfOwnerMatch option
 symmetric key algorithms
 common schemes
symmetric keys
 exchange, problems with
 security issues
 uniqueness, problems with
 SYN packets
 SYN ACK packets
 syslog
system administration
 errors by
 references on
 sanitizing media
 system calls, checking return codes from
 systems-based crytpographic attacks
only for RuBoard - do not distribute or recompile


Web Security, Privacy & Commerce
Web Security, Privacy and Commerce, 2nd Edition
ISBN: 0596000456
EAN: 2147483647
Year: 2000
Pages: 194

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net