Flylib.com
Index_L
Previous page
Table of content
Next page
L
Label bureau , 367 “70
Layer 2 Forwarding Protocol, 121
Layer 2 Funneling Protocol, 120 “21, 124
Layer 2 Tunneling Protocol access concentrator, 120 “23
Layer 2 Tunneling Protocol network server, 121 “23
Layered Security Protocol, 145 “46
Leaf certificate, 192
Legal attack, 356
Legal issues, 107 “11
Legal security, 17
Lightweight Directory Access Protocol, 195
Link layer encryption, 335
Local-area network, 118
Local intranet zone, 289
Local registration agent, 193
Local registration authority, 193
Locator, 338
Lucifer algorithm, 108
Previous page
Table of content
Next page
Security Technologies for the World Wide Web, Second Edition
ISBN: 1580533485
EAN: 2147483647
Year: 2003
Pages: 142
Authors:
Rolf Oppliger
BUY ON AMAZON
Project Management JumpStart
Building the Foundation
Breaking Down the Project Activities
Controlling the Project Outcome
Closing the Books
Appendix C Sample Project Management Checklists
Beginning Cryptography with Java
The JCA and the JCE
Symmetric Key Cryptography
Object Description in Cryptography Using ASN.1
Certificate Revocation and Path Validation
SSL and TLS
Documenting Software Architectures: Views and Beyond
Shared-Data Style
Part II. Software Architecture Documentation in Practice
Notation for Interface Documentation
Summary Checklist
Siemens Four Views
Cisco Voice Gateways and Gatekeepers
The Role of Voice Gatekeepers
SIP Call Flow
Implementing SIP Gateways
Review Questions
Web Systems Design and Online Consumer Behavior
Chapter I e-Search: A Conceptual Framework of Online Consumer Behavior
Chapter IV How Consumers Think About Interactive Aspects of Web Advertising
Chapter VI Web Site Quality and Usability in E-Commerce
Chapter VIII Personalization Systems and Their Deployment as Web Site Interface Design Decisions
Chapter X Converting Browsers to Buyers: Key Considerations in Designing Business-to-Consumer Web Sites
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the TNS Listener and Dispatchers
Attacking the Authentication Process
Triggers
Indirect Privilege Escalation
Running Operating System Commands
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies