Practical Unix & Internet Security, 3rd Edition

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

C programming language  

       ANSI C compiler for  

       ANSI standards for  

       buffer overflows, avoiding  

       GNU  

C shell   [See csh]

C, a Reference Manual (Harbison, Samuel P. and Steele, Guy L., Jr.)  

C2 audit  

cables, network  

       cutting, as destructive attack  

       fiber optic  

       routing of   2nd  

       tampering detectors for  

       wiretapping  

caching

       efficient use of  

       nameserver, poisoning of   2nd  

call forwarding  

callback schemes   2nd  

Caller-ID (CNID)   2nd  

calls, system   [See system calls]

capabilities system, Linux  

car bombs , as destructive attack  

carbon monoxide detectors  

case, of usernames  

cat command   2nd   3rd   4th  

CD-ROM, mounted read-only  

CDA (Communications Decency Act)  

CDFs (context-dependent files)  

ceilings, dropped, access through  

cellular phones  

Cerf, Vint  

CERIAS (Center for Education and Research in Information Assurance and Security) web site  

CERT/CC (Computer Emergency Response Team Coordination Center)

       contact information for  

       mailing list for  

change detection   [See files, detecting changes to]

Chapman, D. Bren (Building Internet Firewalls)  

character devices   2nd  

chargen service   2nd   3rd  

chattr() system call  

chdir() system call   2nd  

checklists for detecting changes  

checksums   2nd  

Cheswick, Bill (Firewalls and Internet Security)  

chflags() system call  

chfn command   2nd  

chgrp command  

child pornography  

child processes  

Children's Internet Protection Act  

chkey command  

chmod command  

       absolute form  

       symbolic form  

chosen plaintext attacks  

chown command  

Christiansen, Tom (Programming Perl)  

chroot jail  

chroot() system call

       with anonymous FTP   2nd   3rd  

       jail() as alternative to  

       using in programs  

chrootuid daemon  

chsh command  

CIAC web site  

CIDR (Classless InterDomain Routing)   2nd  

CIFS (Common Internet File System)   [See SMB]

ciphertext   2nd  

Class A addresses  

Class B addresses  

Class C addresses  

Class D addresses  

Class E addresses  

classical network addresses  

Classless InterDomain Routing (CIDR)   2nd  

cleaning personnel  

Clear to Send (CTS)  

cleartext  

client authentication, SSH  

client flooding  

client-side NFS security  

client/server model  

clients , NIS   [See NIS]

Clipper encryption chip  

clock, system

       changing  

       for random seeds  

       Secure RPC timestamp  

       synchronizing  

clogging (SYN flood attacks)  

closelog() system call  

clri command  

CMW (Compartmented-Mode Workstation) environment  

CNID (Caller-ID)  

COAST (Computer Operations, Audit, and Security Technology)  

code breakers   [See intruders]

Code Breakers: The Inside Story of Bletchley Park (Hinsley, F. H. and Stripp, Alan)  

codebook attacks  

codebooks   2nd  

The Codebreakers (Kahn, David)  

CodeCenter (Centerline)  

collision, message digest values  

Combined Log Format  

Comer, Douglas E.

       (Internetworking with TCP/IP)  

       Xinu developed by  

command shells   [See shells ]

commands   [See also specific command names ]

       accounts running single  

       format used in book  

       remote execution of  

       running simultaneously   2nd   [See also multitasking]

       trusted computing base (TCB) of  

commenting out services  

COMMIT function (RPC)  

Common Criteria book  

Common Internet File System (CIFS)   [See SMB]

Common Log Format  

Common Object Request Broker Architecture (CORBA)  

Communications Decency Act (CDA)  

Communications of the ACM  

community strings (SNMP)  

comparison copies  

compartmentalization of system privileges  

Compartmented-Mode Workstation (CMW) environment  

compliance audits  

Compressed SLIP (CSLIP)  

Computer Audit Update  

computer crime   [See legal issues]

Computer Crime: A Crimefighter's Handbook (Icove, David; Seger, Karl; VonStorch, William)  

computer criminals   [See intruders]

Computer Emergency Response Team Coordination Center   [See CERT/CC]

computer equipment   [See hardware]

Computer Fraud & Security Update  

Computer Law & Security Report  

Computer Operations, Audit, and Security Technology (COAST)  

Computer Oracle and Password System   [See COPS]

Computer Related Risks (Neumann, Peter G.)  

computer security   [See security]

Computer Security (Gollmann, Dieter)  

Computer Security Alert  

Computer Security Basics (Russell, Deborah and Gangemi, G. T., Sr.)  

Computer Security Buyer's Guide   2nd  

Computer Security Handbook (Hunt, A. E.; Bosworth, S.; Hoyt, D. B.)  

Computer Security Institute (CSI)   2nd  

Computer Security Journal  

Computer Security: A Comprehensive Controls Checklist (Wood, Charles Cresson, et al.)  

Computer Systems Research Group (CSRG)  

computers   [See hardware]

Computers & Security   2nd  

Computers Under Attack: Intruders, Worms, and Viruses (Denning, Peter J.)  

Computrace tracking system  

Concurrent Versions System (CVS)   2nd   3rd  

confidentiality   2nd   3rd   [See also encryption; integrity]

       compared with integrity  

       compared with security through obscurity  

       of employee information  

       Kerberos and  

       Samba and  

configuration files  

       immutable  

       logging  

       nameserver  

       networks  

       newsyslog program  

       paper copies of  

       protecting  

       security of  

       sendmail  

       Swatch program  

       syslog facility  

connection laundering  

connectionless servers (NFS)  

connections

       hijacking  

       tracing  

       unplugging  

connectors, network  

conserver program  

consistency of software  

console device  

CONSOLE variable  

console.perms file  

consultants , security   [See vendors , security]

contact information  

context, for a process  

context-dependent files (CDFs)  

contingency planning   [See disaster planning]

contractors, security   [See vendors, security]

control characters

       conventions for  

       in directory names  

       in filenames  

       in passwords   2nd  

       in usernames  

conventions used in this book  

cookies, magic (Xauthority)  

Cooper, Simon (Building Internet Firewalls)  

copper network cables, routing of  

COPS (Computer Oracle and Password System)   2nd   3rd  

copyright

       comparison copies violating  

       disabling controls for  

       notices in source code and datafiles  

       unlicensed software and  

CORBA (Common Object Request Broker Architecture)  

core files   2nd  

correctness of data and software   [See consistency of software integrity]

cost-benefit analysis   2nd   [See also risks, assessment of]

       best practices as alternative to  

Count Zero (Gibson, William)  

covert channels  

cp command   2nd  

cpio program   2nd  

CPU overload attacks  

Crack program  

cracklib  

crashes, logging  

CRC checksums   [See checksums]

CREATE function (RPC)  

Cred table (NIS+)  

crimes, computer-related   [See legal issues]

criminal complaints, filing  

criminals, as authors of programmed threats   [See also intruders]2nd  

Crocker, Steve  

cron daemon, system clock and  

cron file   2nd   3rd  

crontab files   2nd   3rd   4th  

crypt encryption program  

crypt() system call   2nd   3rd  

crypt16 algorithm  

cryptanalysis  

Cryptfs virtual filesystem  

CryptoCard  

cryptographic filesystems   2nd  

cryptography   2nd   [See also encryption]3rd  

       applications of  

       export controls, and  

       history of  

       hybrid public/private cryptosystems  

       message digest functions   2nd  

       published resources on  

       Secure RPC implementation   2nd  

       security checklist for  

       techniques of  

Cryptography and Data Security (Denning, Dorothy E. R.)  

Cryptography and Network Security: Principles and Practices (Stallings, William)  

csh (C shell)   2nd   [See also shells]

       autologout variable  

       history file  

       programs using  

       prompt for  

. cshrc file   2nd   3rd  

CSI (Computer Security Institute)   2nd  

CSLIP (Compressed SLIP)  

CSRG (Computer Systems Research Group)  

ctime   2nd   3rd   4th  

CTS (Clear to Send)  

cu command   2nd   3rd   4th  

The Cuckoo's Egg (Stoll, Cliff)  

current directory  

Curry, David  

CVS (Concurrent Versions System)   2nd   3rd  

Cyberpunk: Outlaws and Hackers on the Computer Frontier (Hafner, Katie and Markoff, John)  

Cyrus SASL (Simple Authentication and Security Layer)  

Категории