|
Bandwidth sharing, 65
Bandwidth throttling, 113, 229
Bastion hosts, 115–116, 154
Biometric identification, 32, 147–148, 160–163
common methods, 161–162
user acceptance, 35, 162–163
Blowfish, 129
Bogons, 206
Border Gateway Protocol (BGP), 97, 99–101
Bridges, 65–66
Business continuity planning, 383–388, See also Disaster recovery planning
Business impact analysis (BIA), 385
Bus topologies, 62
|