Index B


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Bace, Rebecca (Intrusion Detection)  
Bach, Maurice (The Design of the UNIX Operating System)  
back doors   2nd   3rd  
       as common threat  
       in MUDs and IRCs  
       strength of encryption and  
background checks   2nd  
background processes  
backing out of upgrades  
backups
       across network  
       automatic system for  
       commercial systems for  
       configuration files, paper copies of  
       criminal investigations and   2nd   3rd  
       data security for  
       dedicated programs for  
       destruction of  
       differential  
       encryption of   2nd   3rd   4th  
       file modification times and  
       files with holes  
       guidelines for  
       human error and  
       of individual workstations  
       legal issues concerning  
       levels of  
       location of   2nd  
       of log files  
       media failure, protecting against  
        methods of  
       migrating  
       of networks  
       performing before upgrades  
       public key encryption and PGP  
       purposes of  
       read-only partitions  
       retention of   2nd  
       rotating media  
       schedule for  
       security checklist for  
       security of  
       simple archives  
       simple local copies  
       simultaneous  
       software for  
       standards for  
       strategies for   2nd  
       of system-critical files  
       theft of  
       verifying   2nd  
       what to back up  
       world-readable  
       write-protecting  
bacteria   2nd  
BADSU attempts, logging  
Badulescu, Ion  
banners
       modem  
       SMTP  
bash history file  
Basic Input/Output System (BIOS)  
batch command  
batch jobs   [See cron file]
baud  
Bellovin, Steve (Firewalls and Internet Security)  
Berkeley BSD Unix   [See BSD Unix]
Berkeley FTP server, restricting accounts with  
Berkeley Software Design, Inc. (BSDI)  
Bernstein, Dan  
best practices  
beverages, effects on hardware  
bftpd server  
bidirectionality of modems   2nd  
biff service  
bigcrypt algorithm  
/bin directory  
       /bin/csh   [See csh]
       /bin/ksh   [See ksh]
       /bin/login   [See login program]
       /bin/passwd   [See passwd command]
       /bin/sh   [See sh]
       in restricted filesystems  
binary code, downloading   2nd  
binary owner  
BIND name server   2nd  
bind() system call  
BIOS (Basic Input/Output System)  
Bishop, Matt  
Blaze, Matt  
block algorithms  
block devices   2nd   3rd  
block/send commands, Trojan horses and  
Blowfish algorithm  
bogus nameserver cache poisoning  
bogusns directive  
Bolsky, Morris I. (The New Kornshell Command and Programmang Language)  
bombs , as destructive attack  
books, security  
boot disks, viruses on  
BOOTP protocol  
Bootparams table (NIS+)  
Bostic, Keith (The Design and Implementation of the 4.4 BSD UNIX Operating System)  
Bosworth, S. (Computer Security Handbook)  
bounds checking  
Bourne shell   [See sh]
bps (bits per second)  
brackets ([]), indicating optional syntax  
Brand, Russell  
break-ins
       case studies of  
       commands used to discover  
       commands used to monitor   2nd  
       contacting a remote system administrator  
       detecting and discovering   2nd  
       documenting  
       legal recourses after  
       planning for  
        preserving evidence from  
       recovering from  
       responding to   2nd  
       resuming operation after  
       security checklist for  
       software toolkit for  
A Brief History of Time: From the Big Bang to Black Holes (Hawking, Stephen W.)  
broadcast storms  
Brunner, John (Shockwave Rider)  
brute force attacks   2nd   3rd   4th  
BSD 4.2  
BSD 4.4 Lite   2nd  
BSD Unix   2nd   3rd   [See also FreeBSD; Mac OS X; NetBSD; OpenBSD]4th  
       "no dump" file attribute  
       append-only files  
       chroot wrapper  
       exporting filesystems read-only  
       exporting NFS directories  
       Fast File System (FFS) reserved space  
       forcible unmounts with  
       history of  
       host-based firewall for   2nd  
       immutable files  
       inetd program and  
        integrity-checking tools  
       jail() system call   2nd  
       kernel security levels on  
       modems and  
       mtree program  
       nonexecutable stack  
       package management commands  
       packaging tools  
       periodic security scans  
       permission options for  
       pkg (package) system  
        portmapper program  
       process accounting with  
       ps command  
       published resources on  
       secure terminals  
       server startup on  
       SGID and sticky bits for directories  
       shadow password file  
       SMB kernel support  
       spongy mounts  
       TCP Wrappers support  
       terminal security on  
       utmp and wtmp log files  
       vipw command  
BSD/OS   2nd   3rd  
BSDI (Berkeley Software Design, Inc.)  
buffers
       checking boundaries  
       overflow attack  
       overruns  
bugs   2nd   [See also insects , effects on hardware]3rd  
       Bugtraq mailing list  
       hacker challenges and  
       hardware  
       in Unix utilities  
       keeping secret  
       in NFS  
       security  
       software  
       testing for   2nd  
       tips on avoiding  
Bugtraq mailing list  
Building a Secure Computer System (Gasser, Morrie)  
Building in Big Brother: The Cryptographic Policy Debate (Hoffman, Lance J.)  
Building Internet Firewalls (Zwicky, Elizabeth D.; Chapman, D. Bren; Cooper, Simon)  
Building Secure Software (Viega, John and McGraw, Gary)  
bulk erasers  
Burning Chrome (Gibson, William)  
byte-by-byte comparisons  



Practical UNIX and Internet Security
Practical Unix & Internet Security, 3rd Edition
ISBN: 0596003234
EAN: 2147483647
Year: 2003
Pages: 265

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net