[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] NAI Labs named mutexes named pipes Netstrings network logging network sockets, limiting number created network validation networks authenticated secure channels, building without SSL CWC mode authentication message format message ordering and dropping, security implications rollback attacks, securing against terminating connections BSD, restricting access in connections, securing with virtual private networks database connections, securing interprocess communication using sockets Kerberos encryption, using Microsoft WinInet API, securing web communications using process user and group IDS, obtaining for authentication session IDs SSL clients, creating SSL servers, creating SSL session caching tunnels NIST (National Institute of Standards and Technology) web site non-repudiation 2nd nonces hardening hash functions against birthday attacks HMAC or OMAC, using with IVs, compared to usage in protection from birthday attacks noncryptographic pseudo-random number generators NULL DACLs null terminators, encoding in URLs NULLPAD_START macro vs. GNU objdump utility vs. IDA Pro disassembler num_traps counter numbers, testing for primality Numega SoftICE |