Web Security, Privacy and Commerce, 2nd Edition

only for RuBoard - do not distribute or recompile

Web Security, Privacy & Commerce, 2nd Edition

[Symbol][A][B][C][D][E][F][G][H][I][J][K][L][M][N][O][P][Q][R][S][T][U][V][W][X][Y][Z]
 ' (backquote function)
 'fair use' provisions, copyright law
 8mm video tape
A
 absolute identification
 Absolute Software Corporation
 access.conf file
 access control , 2nd  , 3rd
 . . .
 Apache web servers
 authorizations databases
 directoryname parameter
 host-based restrictions
 IIS
 passwords
 physical
 physical tokens for
 PKI, using
 user-based
 access( )
 accidents , 2nd
 ACH (Automated Clearing House) , 2nd
 online security of
 ACK packets
 ACPA (Anticybersquatting Consumer Protection Act)
 ActiveX controls
 Authenticode
 CLSID (Class Identifier)
 hijacking by attackers
 Java, and
 known risks of
 misconceptions
 security issues
 tags
 uses
 ad blockers
 address munging or mangling
 address verification
 addressing
 internal
 Adleman, Leonard M.
 administrative logins
 Advanced Research Projects Agency (ARPA)
 aggregate information
 air ducts
 air filters
    See : detectors alarms
 alerts
 algorithmic attacks on encryption
 AllowOverride command
 Amateur Action Bulletin Board System
    See : AOL America Online
 American Civil Liberties Union v. Reno
 American Registry of Internet Numbers (ARIN)
 Andreessen, Mark
 animals
 anonymity
 certificates and
 digital payment systems and
 anonymized information
 Anonymizer.com
 secure tunneling services
 anonymous web browsing
 services for
 techniques
 AOL (America Online) , 2nd
 anonymous browsing and
 identity theft, and
 Apache web servers
access controls
 using databases
 CAs, creating for
FreeBSD, on
 directory structure
 httpd.conf configuration file
installation
 verification of
 mod_ssl configuration file
 origins
 SSL, and
 APIs (Application Program Interfaces)
 extensibility of
 programming guidelines
 Apple Macintosh, security and
 application/pics-labels encoding
 application/pics-service encoding , 2nd
 appropriation
 architecture, room
 archiving information , 2nd
 ARIN (American Registry of Internet Numbers)
 ARPA (Advanced Research Projects Agency)
 arpwatch
 asymmetric key algorithms
 AT&T Labs Research
 Atkins, Derek
 attackers
 attacks
 automation of
 growing problem of
 host-based restrictions, against
 legal options regarding
 Mafiaboy
 mirror-world
 packet sniffing
 reconstructing
 recovery from
 remote
 social engineering
 software tools for
 attacks, cryptographic , 2nd
 against hardware-based cryptographic systems
 on message digests
 on symmetric encryption algorithms
 on public key algorithms
 Audiotex Connection, Inc.
 audits
 AUTH_TYPE variable
 authentication , 2nd
 message digests
 of new users
 offline systems
 online systems
 PGP, using
 RADIUS protocol
 SSH RSA keys
 token-based
 two-factor authentication
 Authenticode , 2nd  , 3rd  , 4th
 ActiveX, and
 certificate qualification
 evaluation
 Internet Exploder, and
 MD5, use of
 publishing with
 security issues
 signed files, structure of
 Software Developer s Kit (SDK)
 Software Developer s Kit (SDK), online source
 uses
 VeriSign public key infrastructure, and
 authorization , 2nd
 environment variables for
 directive and
 AutoComplete feature, clearing
 autologout shell variable
 automated checking systems
 automatic memory management
    See : detectors automatic power cutoff
only for RuBoard - do not distribute or recompile

Категории