Index_T

 < Day Day Up > 



T

T-1 network, 65

table formulas, 214

Taepo Dong, 2, 337

Taepo Dong 1 missile launch, 337, 358

Taiwan Strait crisis of 1996, 336

Taiwan, 261

Tamil Tigers, 312, 315, 317

tamperproof envelopes, 173, 176

tape libraries, 104

tape technology, 103, 209–11

target concept, 495

target identification, 430–31

tax acts, 183

TCP/IP (transmission control protocol/Internet protocol), 281

technological thievery, 362

technology centers, 294

Tekwar, 251

Tel Aviv Stock Exchange, 352

telecommunication’s “Big Brother” approach, 519

telecommunications fraud, 538

Telnet (23), 592

TEMPEST surveillance, 431

terminator.rs.itd.umich.edu, 192

terrorism, organized crime and inside operations, 387

terrorist political violence, 301

terrorist profile, 334

terrorist recruitment, 370–71

TextSearch Plus™ software, 41

text search techniques, 41, 83, 150–51

Thad Cochran, 337

The Boeing Company, 196–97, 444

The Chubb Group, 524

The Economic Crime Investigation Institute, 637

The Great Firewall of China, 347

The Heritage Front, 330

The Honeynet Project, 174, 452, 579

The International Third Position, 329

The Islamic Legitimacy of the Martyrdom Operations, 329

The National Aeronautics and Space Administration research contract, 548

The National White Collar Crime Center, 637

The New York Times Co, 546

The Report of The Commission to Assess the Ballistic Missile Threat to the United States, 358

The Vulture of Jihad, 427

The X-Files, 459

theft, 46, 57, 533

theft recovery software, 46

Third Wave nations, 268–69

third wave wars, 249

Third World human rights organizations, 331

Third World, 302

Thomas Roessler, 579

threat identification process, 72

Thurston High School, 40

Tiananmen Square, 349

Tim Berners–Lee, 284

time difference of arrival (TDOA), 478

time-division multiple-access TDMA, 538

timelines, 133, 150

time protocol, 193

timestamp audit trail, 36, 150

timestamp exchanges, 194

Titan Corp, 408

Titan Systems, 247

Tivoli, 104

Tokyo Defense Ministry, 246

Top Layer Networks, 586

Top Layer NetworksAppSafe™, 60

total back-up solutions, 106

Toyota, 443

Toysmart.com, 403

traceroute ip, 74

trackable electronic documents, 46

transnational kleptocracy, 382

Trans Union, 535

trap and trace devices, 450

trapdoors, 264, 284, 427, 441

trapped versions, 609

TR Cutler, Inc., 197

triple-DES, 559

Tripwire™, 67, 129

Trojan Horse Programs, 37, 82, 240, 440–41, 584

TrustE, 404–05

trusted independent sources, 264

trustmarks, 404

TrustWave, 587

TRW Inc., 340

Tunnel, 349

Twofish, 560

types of evidence, 124–125



 < Day Day Up > 



Computer Forensics. Computer Crime Scene Investigation
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
ISBN: 1584500182
EAN: 2147483647
Year: 2002
Pages: 263
Authors: John R. Vacca

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net