Practical Guide to Software Quality Management (Artech House Computing Library)

 < Day Day Up >   

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] B flag (newsyslog)

-b option (syslogd) back-tick (Ô) backup MX server 2nd backups 2nd

BalaBit bandwidth, thttpd and 2nd Banner configuration option banners directive base35.tgz file 2nd bash shell bell action (swatch)

Bellovin, Steve

Berkeley Internet Name Daemon [See BIND] Berkeley Packet Filter (BPF) interface Berkeley Packet Filter (BPF) option

Bernstein, Daniel J. 2nd 3rd

Big Brother monitoring tool 2nd

Big Sister monitoring tool 2nd

Binc IMAPBIND (Berkeley Internet Name Daemon)

     additional resources     BIND 8 2nd

     BIND 9 2nd 3rd 4th 5th 6th     cache poisoning and     chroot and     djbdns comparison     installing

     missing zone data and

     operating

     overview

     recursive queries

     remote administration

     security options and

     syslogd and

     unauthorized zone transfers

blacklists

     mail relay and

     open relays and

     RBLs 2nd 3rd

     side effects of

Blaze, Matt blocker files

blowfish encryption (OpenBSD) 2nd

bounce_size_limit variable (Postfix)

BPF interface

BPF option (FreeBSD) bpf packet filtering branches, tracking

Broadcom Ubsec chipset bsd distribution set (OpenBSD)BSD systems     filesystem 2nd

     inherent protections 2nd     kernel 2nd 3rd     optimization     user process controls     XFree86buffer overflows     audits and

     fighting

     identifying risk with 2nd 3rd     Perl and     ProPolice stack protection

     W^X memory protection

buffers 2nd 3rd

Bugtraq forum 2nd 3rd

bulk email bump in the wire firewall

 < Day Day Up >   

Категории