Network Perimeter Security: Building Defense In-Depth

K

Key exchange, 132, 181, 316–320, See also Internet Key Exchange

Just Fast Keying (JFK), 325–327

Keys, 120–123, See also Public key infrastructure

length of, 120, 122

management, 171, 184–185

Keystroke dynamics, 162

Klez, 226

Категории