[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]
NAI Labs
named mutexes
named pipes
Netstrings
network logging
network sockets, limiting number created
network validation
networks
authenticated secure channels, building without SSL
CWC mode authentication
message format
message ordering and dropping, security implications
rollback attacks, securing against
terminating connections
BSD, restricting access in
connections, securing with virtual private networks
database connections, securing
interprocess communication using sockets
Kerberos encryption, using
Microsoft WinInet API, securing web communications using
process user and group IDS, obtaining for authentication
session IDs
SSL clients, creating
SSL servers, creating
SSL session caching
tunnels
NIST (National Institute of Standards and Technology) web site
non-repudiation
2nd
nonces
hardening hash functions against birthday attacks
HMAC or OMAC, using with
IVs, compared to
usage in protection from birthday attacks
noncryptographic pseudo-random number generators
NULL DACLs
null terminators, encoding in URLs
NULLPAD_START macro
vs. GNU objdump utility
vs. IDA Pro disassembler
num_traps counter
numbers, testing for primality
Numega SoftICE
|