Halting the Hacker: A Practical Guide to Computer Security (2nd Edition)

I l @ ve RuBoard

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]

packet filtering  

PAM  

PAM (Pluggable Authentication Module)   2nd   3rd   4th  

parasite   2nd  

password   2nd  

       challenge-response  

       computer-generated  

       one-time  

       shadow  

password cracking   2nd   3rd   4th  

password file  

password guessing   2nd   3rd   4th  

password selection  

password snooping  

Password+  

passwords  

patches   2nd  

PATH variable attack   2nd  

performance analysis tools  

permissions   2nd   3rd   4th   5th   6th   7th  

       default  

personnel policies  

physical access   2nd   3rd   4th   5th   6th   7th   8th  

physical intrusions  

physical isolation  

physical security   2nd  

Point to Point Protocol (PPP)   2nd  

policies   2nd   3rd  

POP (Post Office Protocol)   2nd  

POP3.   [See See POP]

portmap  

presentation of evidence  

print spooler  

privacy   2nd   3rd   4th  

privileged group  

privileged users  

procedures   2nd   3rd   4th  

process hiding  

process monitoring   2nd   3rd  

processes

       completed  

       running  

professional hacker  

project  

proprietary information  

prosecution   2nd  

public relations   2nd   3rd  

I l @ ve RuBoard

Категории