Halting the Hacker: A Practical Guide to Computer Security (2nd Edition)

I l @ ve RuBoard

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]

C2 security grade   2nd  

captive account  

CDE  

CDE (Common Desktop Environment)  

chain of custody   2nd  

challenge-response pasword  

changing logs  

chgrp  

child privacy  

chmod   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  

chroot   2nd  

chsh   2nd  

collection of evidence   2nd   3rd  

command histories  

Common Internet File System (CIFS)  

completed connections  

completed processes  

comprehensive monitoring  

compromised software  

compromising information  

compromising systems  

computer-generated password  

connections

       active  

       anonymous  

       completed  

       hiding   2nd   3rd  

       monitoring   2nd  

       network  

       stealth  

consuming unused resources  

contracted employee  

contractors  

counterintelligence  

countermeasures   2nd  

counterstrike  

criminal investigation  

cron   2nd   3rd  

cryptographic checksum  

cyber-activism  

cyber-crimes  

cyber-stalking   2nd  

cyber-terrorism  

cyber- warfare  

I l @ ve RuBoard

Категории