Security in Computing, 4th Edition

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Q0-Q7 quality levels

Quality

     demands

     privacy principles and policies

     software

Quantifying security value

     accurate data

     attack sources

     attack types

     comparability of categories

     consistent data

     cost of U.K. security incidents

     economic impact 2nd 3rd

     ISBS (Information Security Breeches Survey) 2nd

     justification data

     overview

     reliable data

     representative data

     respondent types

     security practices 2nd

     timelines

Quantum cryptography

     cryptography with photons

     implementation

     overview

     photon reception

     polarizing filters

     quantum physics

Quantum physics

Queries database

Query analysis, database inference

Категории