| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
R (Page 2 of 2) Reverse engineering The process of analyzing functions of an existing objects and improves or duplicates the process http://www.computerworld.com/softwaretopics/software/appdev/story/0,10801,65532,00.html http://citeseer.nj.nec.com/guha96network.html Canceling credentials. Refer to CRL The process of determining security costs compared to threats http://www.security-risk-analysis.com/introduction.htm Provides access to a computer system via a 'back door'. http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci547279,00.html A device that connects X number of LANs using the network layer (layer 3) data. Unlike a bridge which is limited to 2 LANs http://www.webopedia.com/TERM/r/router.html Creators of the RC block ciphers http://www.rsasecurity.com/company/corporate.html http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci214273,00.html Allows MAC implementation on Linux. Refer to MAC. http://www.imagineers.nl/RSBAC/articles/html/A1/en/x117.htm
Home - Table Of Contents - Contact Us CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com Version 1.0 - Version Date: November 15, 2004 Adapted with permission from a work created by Tcat Houser et al. CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved. Not responsible for any loss resulting from the use of this site. |