The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

kernel

     Linux, probing

     UNIX

kernel files, UNIX

Kernel Object Manager (KOM)

Kernel Probe Vulnerability in Linux 2.2 listing (10-1)

key exchange payloads, ISAKMP (Internet Security Association and Key Management Protocol) 2nd

keys, Windows NT registry

     key squatting

     permissions

     predefined keys

kill bit, Active X controls

kill( ) function

Kirch, Olaf

Klima, Vlastimil

KOM (Kernel Object Manager)

Koziol, Jack

Krahmer, Sebastian 2nd

Kuhn, Juan Pablo Martinez

Категории