Security in Computing, 4th Edition

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Galois fields

Gates, Bill

     on passwords

     on product quality

Gateways

     application proxy

     packet filtering

General knapsacks

Genetic diversity

Geosynchronous orbit

German Green Book

Gibson, Steve

GISA (German Information Security Agency)

GLBA (Graham-Leach-Bliley Act) 2nd

Goals of security

Gottschalk v. Benson

Government [See also specific governments.]

     and privacy

         Council of Europe

         European Privacy Directive

         Icelandic DNA database

         principles and policies

         U.K. RIPA (Regulation of Investigatory Powers Act)

     data mining

     e-mail, security policy example

GrahamDenning security model

Grandin, Temple

Granularity 2nd

Greatest common divisor

Group behavior

Group file protection

Guaranteed fair service

Guards 2nd 3rd

Guess function

Guessing passwords

Категории