Security and Usability: Designing Secure Systems That People Can Use

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

National Research Council Institute for Information Technology (NRC-IIT)

Nessus Open Source Vulnerability Scanner Project

Netscape Navigator

     special privileges, scripts requesting

     v2.0 release, cookies and

     version 7, P3P functionality in

Netsky virus

NetWare, password restrictions

Network-in-a-Box (NiaB), usable PKI deployment

networks

    access to

         attacks, persistent hackers

         Chameleon

     anonymizing 2nd

         case studies of

     monitoring

         log analysis 2nd

         traffic

     P2P, usability/privacy issues

         security guidelines

     PKI deployment, Network-in-a-Box study

     security model for

    wireless, PKI deployment for

         case study

     wireless, PKI deployment for, case study 2nd

newsgroups, patch distribution

NiaB (Network-in-a-Box), usable PKI deployment

NiaB access point (NiaB AP)

NiaB AP (NiaB access point)

Nodder, Chris

Norton Disk Doctor, secure file deletion

Notes Remote Procedure Call (NRPC)

NRC-ITT (National Research Council's Institute for Information Technology)

NRPC (Notes Remote Procedure Call)

NVisionIP interface

Категории