[ Team LiB ]

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

NAI Labs 
named mutexes 
named pipes 
Netstrings 
network logging 
network sockets, limiting number created 
network validation 
networks 
    authenticated secure channels, building without SSL 
        CWC mode authentication 
        message format 
        message ordering and dropping, security implications 
        rollback attacks, securing against 
        terminating connections 
    BSD, restricting access in 
    connections, securing with virtual private networks 
    database connections, securing 
    interprocess communication using sockets 
    Kerberos encryption, using 
    Microsoft WinInet API, securing web communications using 
    process user and group IDS, obtaining for authentication 
    session IDs 
    SSL clients, creating 
    SSL servers, creating 
    SSL session caching 
    tunnels 
NIST (National Institute of Standards and Technology) web site 
non-repudiation  2nd 
nonces 
    hardening hash functions against birthday attacks 
    HMAC or OMAC, using with 
    IVs, compared to 
    usage in protection from birthday attacks 
noncryptographic pseudo-random number generators 
NULL DACLs 
null terminators, encoding in URLs 
NULLPAD_START macro 
    vs. GNU objdump utility 
    vs. IDA Pro disassembler 
num_traps counter 
numbers, testing for primality 
Numega SoftICE 

[ Team LiB ]