Wireless Operational Security
B
B3 Security, 145 “47
B3Sig SDK, 145 “46
defined, 145
scheme advantages, 146
See also Cryptography toolkits
Backdoors, 90
BackOfficer Friendly, 62 “63
Back Orifice (BO), 63
Baselining, 282 “83
defined, 282
for DoS attack analysis, 283
Biometric systems, 39
Bluetooth, 123 “24
Bouncy Castle (BC) lightweight API, 142 “43
defined, 142
open -source development model, 142 “43
problems, 143
See also Cryptography toolkits
Boundary issues, 48
Broadcast Key Rotation (BKR), 228
Brute force attacks, 42