Flylib.com
Index_M
Previous page
Table of content
Next page
M
MAC
ACL functionality, 179
address spoofing/circumventing filters, 201 “2
Macro viruses, 217 “18
Malicious code attacks, 71 “72, 217 “20
macro viruses, 217 “18
spyware, 219 “20
Trojan horses, 219
virus incidents, 217
worms, 218 “19
See also
Attacks
Malicious coders, 9
Malicious hackers, 8
Mandatory access control model, 26 “27
MIDP 2.0, 148
MiniStumbler, 196
Misuse, 72
Mobile IP, 258 “60
clients , 258
firewalls and, 259
IP datagrams and, 259
specification, 258
Mobile security, 129 “50
authentication, 137 “38
certificates, 129 “37
code signing, 149
content-based, 138 “39
cryptography toolkits, 141 “47
data, 147 “48
device, 140
device-specific APIs, 147
distributed access control, 140
ubiquity, 137
verification, 149 “50
Multifactor authentication, 301 “2
Multipurpose Internet Mail Extensions (MIME), 102 “3
Previous page
Table of content
Next page
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153
Authors:
John Rittinghouse PhD CISM
,
James F. Ransome PhD CISM CISSP
BUY ON AMAZON
Metrics and Models in Software Quality Engineering (2nd Edition)
Criteria for Causality
Collecting Software Engineering Data
Basic Assumptions
Orthogonal Defect Classification
Statistical Process Control in Software Development
Managing Enterprise Systems with the Windows Script Host
Input/Output Streams
Data Access
System Administration
Internet Information Server
Security
C++ How to Program (5th Edition)
Function Pointers
Converting between Types
Exercises
Input/Output of Objects
Summary
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
Aggregates
Expression Evaluation and Type Conversion
Client 1Connecting to the Server
Client 2Adding Error Checking
Client 2Query Processing
An Introduction to Design Patterns in C++ with Qt 4
Encapsulation
Dialogs
QActions, QToolbars, and QActionGroups
Validators
C++ References
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Summary
RTSP
Failover and Redundancy
Directing Traffic to the AIP-SSM
System Clock
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies