X



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Walk-through, code
WAN (wide area network)
War driving
Ware committee report
Ware, Willis
Warranty of cyberworthiness
Watermarking
Weak keys, DES
Weak passwords
Weakest link principle
Weakest point
Weakness [See Risk analysis; Risks; Threats; Vulnerabilities.]
Weaknesses
Web bugs 2nd
Web servers, escape-character attack
Web sites [See also Internet.]
     content, legal issues
     defacing
     posting privacy policies
     privacy
         advertising
         adware
         contests
         cookies
         credit card payments
         drive-by installation
         highjackers
         keystroke loggers
         offers
         online environment
         online profiling
         payment schemes
         payments online
         precautions
         registration
         shopping
         site ownership
         spyware
         third-party ads
         third-party cookies
         web bugs
     privacy controls, commercial
     privacy controls, government
     tracking usage
     vulnerabilities
Well-formed transactions
Well-known authentication
WEP (wired equivalent privacy)
White-box testing
Wide area network (WAN)
WiFi [See Wireless.]
WiFi Protected Access (WPA)
Wild cards
Wilshire Associates, e-mail theft
Windows, distributed authentication
Windows, multilevel databases [See also Views.]
Wireless networks
     description
     eavesdropping
     interception
     rogue access points
     security
     theft of service 2nd
     vulnerabilities
     vulnerabilities, case study
     war driving
     wiretapping
Wiretapping 2nd
Woods, Alan
Word, deleting text
Work for hire
Workstations
World War II case studies
     ASINTOER code
     Enigma code machine
     Japanese codes
     poem codes
     silken codes
     Soviet Union codes
Worms [See also Malicious code; Viruses.]
     Code Red 2nd
     definition
     Internet worm
WPA (WiFi Protected Access)
Write-down




Security in Computing
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2006
Pages: 171

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net