Computer Security Basics

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

back door 2nd

backups

     hints for

badges

BANs

Barlow, John

baseband

basic service set (BSS)

Bell, David 2nd

Bell-LaPadula model 2nd 3rd

Beneich, Denis

Biba model 2nd

biometrics 2nd

     devices

     fingerprints

     handprints

     iris scans

     keystroke verification

     overview

     retina patterns

     security

     signature-writing pattern

     voice verification

BLOWFISH

bombs

Bootstrap Protocol (BOOTP)

Bouncing Ball virus

Brain virus

Breton, Thierry

bridge

broadband 2nd

broadcast networks

Brooks Act

Brooks Act mandate

Brunner, John

brute force attack

BubbleBoy virus

buffer overflow attacks

building area networks

Burgundy Book

buying security

     government requirements

     information protection

Категории