Team LiB   Previous Section
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Y] [Z]

back doors 
    attack 
backups, tape 
bad code 
    psychological factors 
    real-world factors 
    technical factors 
bad practices
    during design 
    during implementation 
    during operations 
Bar-Gad, Izhar 
Barcalow, Jeffrey 
bastion host 
Beattie, Steve 
Bellovin, Steven M. 
Bentley, Jon 
Bishop, Matt 
bit rot 
bit-twiddling attack 
black-box testing 
book resources 
bounds checking 
Brooks, Frederick P.  2nd 
buffer overflow attack 
buffer overflows 
bugs
    cost of fixing 
    estimates 
Butler, Shawn A. 

Team LiB   Previous Section