E



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

E2
E2 NTT
     Nippon Telegraph and Telephone Corporation (represented by Masayuki Kanda)
earthquakes
Easter egg
eavesdroppers
eavesdropping attacks
     advanced
     defenses
ECB (Electronic Codebook)
Edwards, Dan
EEE 802.11x wireless standard
electric circuit card
electricity
electromagnetic emissions 2nd
electromagnetic radiation
Electronic Data Interchange (EDI)
electronic eavesdroppers
Electronic Frontier Foundation
electrostatic vector
ELF (extremely low frequency)
email, spam and
emanations
     electronic
     standardization
     vulnerabilities
emergency sites
employee security management
employees, setting security rules for
enciphering
encrypted communications
encryption 2nd 3rd 4th
     algorithm
     ciphers
     cryptographic export restrictions
     defined
     end-to-end
     end-to-end link
     government algorithms
     government cryptographic programs
     history
     link
     off-line
     one-time pad
     online
     other algorithms
     quantum
     RSA algorithm
     table maintained by RSA Laboratories
     uses for
encryption technologies
end-to-end encryption 2nd
end-to-end link encryption
Endorsed TEMPEST Products Program
Endorsed TEMPEST Test Services Program
Enigma machine
Environmental Protection Agency
equipment locks
Escrowed Encryption Standard (EES)
estimates
European Community's Information Technology Security Evaluation Criteria (ITSEC)
exclusive OR (XOR)
exploiting vulnerabilities
exploits 2nd
ExploreZip virus




Computer Security Basics
Computer Security Basics
ISBN: 0596006691
EAN: 2147483647
Year: 2004
Pages: 121

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net