Security Technologies for the World Wide Web, Second Edition
B
Babel system, 323
Backbone service provider, 361, 362
Banking software, 169 “70
Base-64 encoding, 32 “33, 40
Basic authentication, 29 “34, 42 “45
Basic encoding rules, 191
Bastion host, 64, 69 “73
BBBOnLine, 342
Bellcore trusted software integrity system, 270 “71
Best current practice, 75
Binary mail attachment, 271 “72
Bind command, 61
Binding framework, 100
Binding information, 8
Black list, 363 “65
Bleichenbacher attack, 168 “69
Blender server, 331 “32
Block cipher, 93, 174
Blowfish algorithm, 95
Browser, 6 “7, 76 “80, 272 “73
Brute force attack, 40, 227
BSD Sockets, 143
Bump-in-the-stack, 141, 142
Bump-in-the-wire, 141 “42
Buyer, 250
Bypass action, 131
Bytecode verifier, 280