P



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

packet sniffers
packet switching and packets
packet-switching networks
packets
PANs
parabolic reflector
Partnership for Critical Infrastructure Security
passive electronic card
passive taps
Password Authentication Protocol (PAP)
password sniffers
passwords 2nd 3rd 4th
     access controls
     cracking
     encryption
     hash
     hints for picking
     hints for protecting
     message digest
     one-time password (OTP)
     protecting
     protecting in storage
     sample controls
     shadow password files
Patriot Act 2nd
payload
PCMCIA (PCCARD)
per-session authentication
perimeters
Perl
Personal area networks
phantom circuits
photo ID card
PHP
Phrack
physical addresses
physical security 2nd
     climate
     earthquakes
     electricity
     fire and smoke
     lightning
     natural disasters
     risk analysis and disaster planning
     water damage
physical vulnerabilities
plaintext
playback
playback or a replay attack
plug-ins
PoE
Point-to-Point Tunneling Protocol (PPTP)
Polish security consultants
Port Address Translation (PAT)
port numbers
Presidential Directive Number 63
Pretty Good Privacy (PGP)
privacy
     considerations
     personal
private keys
protocols 2nd
     family
     model
     suite
public key algorithms
public keys 2nd
     disadvantages
Public Law 99-474
pulse modulation (PM)
Purple Book
Python




Computer Security Basics
Computer Security Basics
ISBN: 0596006691
EAN: 2147483647
Year: 2004
Pages: 121

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net