Team LiB   Previous Section
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Y] [Z]

Maganty, Vivekananda 
Maguire, Steve 
maliciousness 
man-in-the-middle attack 
Mayan temple model 
McConnell, Steve  2nd 
McGraw, Gary  2nd  3rd 
mental model 
    Mayan temple example 
    use of 
metaphors that assist in designing security 
metrics and security 
Miller, Barton P.  2nd 
Miller, Todd C. 
mission creep 
modularizing 
    case study 
Montgolfiers versus Wrights 
mouse driver security, case study 
Mudge 
multilevel security (MLS) 
multiple layers of security, deploying 
Murthy, Ravi 

Team LiB   Previous Section