Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] packet sniffers packet switching and packets packet-switching networks packets PANs parabolic reflector Partnership for Critical Infrastructure Security passive electronic card passive taps Password Authentication Protocol (PAP) password sniffers passwords 2nd 3rd 4th access controls cracking encryption hash hints for picking hints for protecting message digest one-time password (OTP) protecting protecting in storage sample controls shadow password files Patriot Act 2nd payload PCMCIA (PCCARD) per-session authentication perimeters Perl Personal area networks phantom circuits photo ID card PHP Phrack physical addresses physical security 2nd climate earthquakes electricity fire and smoke lightning natural disasters risk analysis and disaster planning water damage physical vulnerabilities plaintext playback playback or a replay attack plug-ins PoE Point-to-Point Tunneling Protocol (PPTP) Polish security consultants Port Address Translation (PAT) port numbers Presidential Directive Number 63 Pretty Good Privacy (PGP) privacy considerations personal private keys protocols 2nd family model suite public key algorithms public keys 2nd disadvantages Public Law 99-474 pulse modulation (PM) Purple Book Python |