Practical Unix & Internet Security, 3rd Edition

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Kahn, David (The Codebreakers)  

Karels, Michael (The Design and Implementation of the 4.4 BSD UNIX Operating System)  

Kaufman, Charles  

       Network Security: Private Communications in a Public World  

Kaufman, Lar (Running Linux)  

Kerberos system   2nd   3rd   4th  

       authentication with  

       installing  

       limitations of  

       logical servers for  

       OpenSSH and  

       random number generator  

       RPC system and  

       server lock and key  

       using  

       using with LDAP  

       using with PAM  

       Versions 4 and 5  

kermit program   2nd  

kernel  

       immutable  

       security levels for   2nd   3rd  

kernel-level firewalls  

Kernighan, Brian (The UNIX Programming Environment)  

key length  

       and brute force attacks  

       search times corresponding to  

       strength relative to crypographic algorithms  

key search attacks   2nd   3rd   4th   5th  

key switches  

keyboard monitors  

keylogin program   2nd  

keylogout program  

keys (encryption/decryption)   2nd   3rd   4th   5th  

keyserv process   2nd   3rd  

keystore file  

keystrokes, monitoring   2nd   3rd   [See also sniffers]

kill command   2nd  

       built in to ksh or csh  

       to stop process overload  

killall command  

Kim, Gene H.   2nd  

kinit program  

Klaus, Christopher William  

kmem device   2nd  

known plaintext attacks   2nd  

Knuth, Donald  

Kochan, Stephen G. (UNIX System Security)  

Korn shell   [See ksh]

Korn, David G. (The New Kornshell Command and Programmang Language)  

ksh (Korn shell)   [See also shells ]

       history file  

       programs using  

       prompt  

       published resources on  

       TMOUT variable  

       umask and  

. kshrc file  

Категории