Linktionary search and index page

Site home page
(news and notices)

Get alerts when Linktionary is updated

Book updates and addendums

Get info about the Encyclopedia of Networking and Telecommunicatons, 3rd edition (2001)

Download the electronic version of the Encyclopedia of Networking, 2nd edition (1996). It's free!

Contribute to this site

Electronic licensing info




Related Entries and Web Links

Main Topic   New/Updated Information   Web Links

Search Linktionary (powered by FreeFind)

Note: Many topics at this site are reduced versions of the text in "The Encyclopedia of Networking and Telecommunications." Search results will not be as extensive as a search of the book's CD-ROM.

Related Entries

Access Control


Administrator Account

Anonymous (Guest) Access

Application-Level Gateway

Attacks and Attackers


Authentication and Authorization


Backup and Data Archiving

Bastion Host

Biometric Access Devices


CDSA (Common Data Security Architecture)

CERN Proxy Services

CERT (Computer Emergency Response Team)

Certificates and Certification Systems

CHAP (Challenge Handshake Authentication Protocol)


Data Management

Data Protection

Denial of Service Attack


Digital Signatures

Disaster Planning and Recovery

Distributed Computer Networks

DSS (Digital Signature Standard)

EAP (Extensible Authentication Protocol)

EDI (Electronic Data Interchange)

Electronic Commerce


Fault Management

Fault Tolerance and High Availability



Hacking and Hackers

Hash Functions

ICSA (International Computer Security Association)

Information Warfare

Internet Protocol Suite

IPSec (IP Security)

Kerberos Authentication Protocol

Key Distribution and Management

L2TP (Layer 2 Tunneling Protocol)

Login Scripts

Logons and Logon Accounts

NAS (Network Access Server)

NAT (Network Address Translation)

Network Concepts

NSA (National Security Agency)

One-Time Password Authentication

One-Way Hash Functions

OPSEC (Open Platform for Security)

P3P (Platform for Privacy Preferences)

PAP (Password Authentication Protocol)


PGP (Pretty Good Privacy)

PICS (Platform for Internet Content Selection)

PKI (Public-Key Infrastructure)

Power and Grounding Problems and Solutions

PPP (Point-to-Point Protocol)

Proxy Servers

Public-Key Cryptography

Quantum Cryptography

RADIUS (Remote Authentication Dial-In User Service)



Rights and Permissions


RSIP (Realm-Specific IP)

S/MIME (Secure Multipurpose Internet Mail Extension)

S/WAN (Secure WAN)

Secret-Key Cryptography

Security Auditing

SET (Secure Electronic Transaction)

S-HTTP (Secure Hypertext Transfer Protocol)

SKIP (Simple Key Management for Internet Protocols)

Smart Cards


SSH (Secure Shell)

SSL (Secure Sockets Layer)

TACACS (Terminal Access Controller Access Control System)

TLS (Transport Layer Security)

Token-Based Authentication

Trust Relationships and Trust Management

Virus and Antivirus Issues

VPN (Virtual Private Network)


X.509 Certificates

Web Links
Click here for newer links

IETF Security Working Groups (see Security Area)

InfoSysSec (the most thorough and complete security site on the Web)

RSA's Crypto FAQ (highly recommended!)

Ron Rivest's Links-possibly the most complete set of links on the Web

Bruce Schneier's Counterpane Web site (sign up for the newsletter!)

Google Web Directory Security page

Microsoft's Security Web page

Peter Gutmann's Security and Encryption-Related Resources and Links

Terry Ritter's "Ciphers by Ritter" Web page

GILC (Global Internet Liberty Campaign) Cryptography page with news, government policy, and other resources

Security Links at Telecom Information Resources on the Internet

Computer and Network Security Reference Index

New Web Links





Copyright (c) 2001 Tom Sheldon and Big Sur Multimedia.
All rights reserved under Pan American and International copyright conventions.