H



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Galois fields
Gates, Bill
     on passwords
     on product quality
Gateways
     application proxy
     packet filtering
General knapsacks
Genetic diversity
Geosynchronous orbit
German Green Book
Gibson, Steve
GISA (German Information Security Agency)
GLBA (Graham-Leach-Bliley Act) 2nd
Goals of security
Gottschalk v. Benson
Government [See also specific governments.]
     and privacy
         Council of Europe
         European Privacy Directive
         Icelandic DNA database
         principles and policies
         U.K. RIPA (Regulation of Investigatory Powers Act)
     data mining
     e-mail, security policy example
GrahamDenning security model
Grandin, Temple
Granularity 2nd
Greatest common divisor
Group behavior
Group file protection
Guaranteed fair service
Guards 2nd 3rd
Guess function
Guessing passwords




Security in Computing
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2006
Pages: 171

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net