Index C


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

C programming language  
       ANSI C compiler for  
       ANSI standards for  
       buffer overflows, avoiding  
       GNU  
C shell   [See csh]
C, a Reference Manual (Harbison, Samuel P. and Steele, Guy L., Jr.)  
C2 audit  
cables, network  
       cutting, as destructive attack  
       fiber optic  
       routing of   2nd  
       tampering detectors for  
       wiretapping  
caching
       efficient use of  
       nameserver, poisoning of   2nd  
call forwarding  
callback schemes   2nd  
Caller-ID (CNID)   2nd  
calls, system   [See system calls]
capabilities system, Linux  
car bombs , as destructive attack  
carbon monoxide detectors  
case, of usernames  
cat command   2nd   3rd   4th  
CD-ROM, mounted read-only  
CDA (Communications Decency Act)  
CDFs (context-dependent files)  
ceilings, dropped, access through  
cellular phones  
Cerf, Vint  
CERIAS (Center for Education and Research in Information Assurance and Security) web site  
CERT/CC (Computer Emergency Response Team Coordination Center)
       contact information for  
       mailing list for  
change detection   [See files, detecting changes to]
Chapman, D. Bren (Building Internet Firewalls)  
character devices   2nd  
chargen service   2nd   3rd  
chattr() system call  
chdir() system call   2nd  
checklists for detecting changes  
checksums   2nd  
Cheswick, Bill (Firewalls and Internet Security)  
chflags() system call  
chfn command   2nd  
chgrp command  
child pornography  
child processes  
Children's Internet Protection Act  
chkey command  
chmod command  
       absolute form  
       symbolic form  
chosen plaintext attacks  
chown command  
Christiansen, Tom (Programming Perl)  
chroot jail  
chroot() system call
       with anonymous FTP   2nd   3rd  
       jail() as alternative to  
       using in programs  
chrootuid daemon  
chsh command  
CIAC web site  
CIDR (Classless InterDomain Routing)   2nd  
CIFS (Common Internet File System)   [See SMB]
ciphertext   2nd  
Class A addresses  
Class B addresses  
Class C addresses  
Class D addresses  
Class E addresses  
classical network addresses  
Classless InterDomain Routing (CIDR)   2nd  
cleaning personnel  
Clear to Send (CTS)  
cleartext  
client authentication, SSH  
client flooding  
client-side NFS security  
client/server model  
clients , NIS   [See NIS]
Clipper encryption chip  
clock, system
       changing  
       for random seeds  
       Secure RPC timestamp  
       synchronizing  
clogging (SYN flood attacks)  
closelog() system call  
clri command  
CMW (Compartmented-Mode Workstation) environment  
CNID (Caller-ID)  
COAST (Computer Operations, Audit, and Security Technology)  
code breakers   [See intruders]
Code Breakers: The Inside Story of Bletchley Park (Hinsley, F. H. and Stripp, Alan)  
codebook attacks  
codebooks   2nd  
The Codebreakers (Kahn, David)  
CodeCenter (Centerline)  
collision, message digest values  
Combined Log Format  
Comer, Douglas E.
       (Internetworking with TCP/IP)  
       Xinu developed by  
command shells   [See shells ]
commands   [See also specific command names ]
       accounts running single  
       format used in book  
       remote execution of  
       running simultaneously   2nd   [See also multitasking]
       trusted computing base (TCB) of  
commenting out services  
COMMIT function (RPC)  
Common Criteria book  
Common Internet File System (CIFS)   [See SMB]
Common Log Format  
Common Object Request Broker Architecture (CORBA)  
Communications Decency Act (CDA)  
Communications of the ACM  
community strings (SNMP)  
comparison copies  
compartmentalization of system privileges  
Compartmented-Mode Workstation (CMW) environment  
compliance audits  
Compressed SLIP (CSLIP)  
Computer Audit Update  
computer crime   [See legal issues]
Computer Crime: A Crimefighter's Handbook (Icove, David; Seger, Karl; VonStorch, William)  
computer criminals   [See intruders]
Computer Emergency Response Team Coordination Center   [See CERT/CC]
computer equipment   [See hardware]
Computer Fraud & Security Update  
Computer Law & Security Report  
Computer Operations, Audit, and Security Technology (COAST)  
Computer Oracle and Password System   [See COPS]
Computer Related Risks (Neumann, Peter G.)  
computer security   [See security]
Computer Security (Gollmann, Dieter)  
Computer Security Alert  
Computer Security Basics (Russell, Deborah and Gangemi, G. T., Sr.)  
Computer Security Buyer's Guide   2nd  
Computer Security Handbook (Hunt, A. E.; Bosworth, S.; Hoyt, D. B.)  
Computer Security Institute (CSI)   2nd  
Computer Security Journal  
Computer Security: A Comprehensive Controls Checklist (Wood, Charles Cresson, et al.)  
Computer Systems Research Group (CSRG)  
computers   [See hardware]
Computers & Security   2nd  
Computers Under Attack: Intruders, Worms, and Viruses (Denning, Peter J.)  
Computrace tracking system  
Concurrent Versions System (CVS)   2nd   3rd  
confidentiality   2nd   3rd   [See also encryption; integrity]
       compared with integrity  
       compared with security through obscurity  
       of employee information  
       Kerberos and  
       Samba and  
configuration files  
       immutable  
       logging  
       nameserver  
       networks  
       newsyslog program  
       paper copies of  
       protecting  
       security of  
       sendmail  
       Swatch program  
       syslog facility  
connection laundering  
connectionless servers (NFS)  
connections
       hijacking  
       tracing  
       unplugging  
connectors, network  
conserver program  
consistency of software  
console device  
CONSOLE variable  
console.perms file  
consultants , security   [See vendors , security]
contact information  
context, for a process  
context-dependent files (CDFs)  
contingency planning   [See disaster planning]
contractors, security   [See vendors, security]
control characters
       conventions for  
       in directory names  
       in filenames  
       in passwords   2nd  
       in usernames  
conventions used in this book  
cookies, magic (Xauthority)  
Cooper, Simon (Building Internet Firewalls)  
copper network cables, routing of  
COPS (Computer Oracle and Password System)   2nd   3rd  
copyright
       comparison copies violating  
       disabling controls for  
       notices in source code and datafiles  
       unlicensed software and  
CORBA (Common Object Request Broker Architecture)  
core files   2nd  
correctness of data and software   [See consistency of software integrity]
cost-benefit analysis   2nd   [See also risks, assessment of]
       best practices as alternative to  
Count Zero (Gibson, William)  
covert channels  
cp command   2nd  
cpio program   2nd  
CPU overload attacks  
Crack program  
cracklib  
crashes, logging  
CRC checksums   [See checksums]
CREATE function (RPC)  
Cred table (NIS+)  
crimes, computer-related   [See legal issues]
criminal complaints, filing  
criminals, as authors of programmed threats   [See also intruders]2nd  
Crocker, Steve  
cron daemon, system clock and  
cron file   2nd   3rd  
crontab files   2nd   3rd   4th  
crypt encryption program  
crypt() system call   2nd   3rd  
crypt16 algorithm  
cryptanalysis  
Cryptfs virtual filesystem  
CryptoCard  
cryptographic filesystems   2nd  
cryptography   2nd   [See also encryption]3rd  
       applications of  
       export controls, and  
       history of  
       hybrid public/private cryptosystems  
       message digest functions   2nd  
       published resources on  
       Secure RPC implementation   2nd  
       security checklist for  
       techniques of  
Cryptography and Data Security (Denning, Dorothy E. R.)  
Cryptography and Network Security: Principles and Practices (Stallings, William)  
csh (C shell)   2nd   [See also shells]
       autologout variable  
       history file  
       programs using  
       prompt for  
. cshrc file   2nd   3rd  
CSI (Computer Security Institute)   2nd  
CSLIP (Compressed SLIP)  
CSRG (Computer Systems Research Group)  
ctime   2nd   3rd   4th  
CTS (Clear to Send)  
cu command   2nd   3rd   4th  
The Cuckoo's Egg (Stoll, Cliff)  
current directory  
Curry, David  
CVS (Concurrent Versions System)   2nd   3rd  
Cyberpunk: Outlaws and Hackers on the Computer Frontier (Hafner, Katie and Markoff, John)  
Cyrus SASL (Simple Authentication and Security Layer)  



Practical UNIX and Internet Security
Practical Unix & Internet Security, 3rd Edition
ISBN: 0596003234
EAN: 2147483647
Year: 2003
Pages: 265

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net