Linktionary search and index page
Site home page (news and notices)
Get alerts when Linktionary is updated
Book updates and addendums
Get info about the Encyclopedia of Networking and Telecommunicatons, 3rd edition (2001)
Download the electronic version of the Encyclopedia of Networking, 2nd edition (1996). It's free!
Contribute to this site
Electronic licensing info
Security Related Entries and Web Links
Main Topic New/Updated Information Web Links
Note: Many topics at this site are reduced versions of the text in "The Encyclopedia of Networking and Telecommunications." Search results will not be as extensive as a search of the book's CD-ROM.
Related Entries Access Control Accounts Administrator Account Anonymous (Guest) Access Application-Level Gateway Attacks and Attackers Auditing Authentication and Authorization Authenticode Backup and Data Archiving Bastion Host Biometric Access Devices Capstone CDSA (Common Data Security Architecture) CERN Proxy Services CERT (Computer Emergency Response Team) Certificates and Certification Systems CHAP (Challenge Handshake Authentication Protocol) Cryptography Data Management Data Protection Denial of Service Attack DIAMETER Digital Signatures Disaster Planning and Recovery Distributed Computer Networks DSS (Digital Signature Standard) EAP (Extensible Authentication Protocol) EDI (Electronic Data Interchange) Electronic Commerce Extranet Fault Management Fault Tolerance and High Availability Firewall FORTEZZA Hacking and Hackers Hash Functions ICSA (International Computer Security Association) Information Warfare Internet Protocol Suite IPSec (IP Security) Kerberos Authentication Protocol Key Distribution and Management L2TP (Layer 2 Tunneling Protocol) Login Scripts Logons and Logon Accounts NAS (Network Access Server) NAT (Network Address Translation) Network Concepts NSA (National Security Agency) One-Time Password Authentication One-Way Hash Functions OPSEC (Open Platform for Security) P3P (Platform for Privacy Preferences) PAP (Password Authentication Protocol) Passwords PGP (Pretty Good Privacy) PICS (Platform for Internet Content Selection) PKI (Public-Key Infrastructure) Power and Grounding Problems and Solutions PPP (Point-to-Point Protocol) Proxy Servers Public-Key Cryptography Quantum Cryptography RADIUS (Remote Authentication Dial-In User Service) Redundancy Replication Rights and Permissions RSA RSIP (Realm-Specific IP) S/MIME (Secure Multipurpose Internet Mail Extension) S/WAN (Secure WAN) Secret-Key Cryptography Security Auditing SET (Secure Electronic Transaction) S-HTTP (Secure Hypertext Transfer Protocol) SKIP (Simple Key Management for Internet Protocols) Smart Cards SOCKS SSH (Secure Shell) SSL (Secure Sockets Layer) TACACS (Terminal Access Controller Access Control System) TLS (Transport Layer Security) Token-Based Authentication Trust Relationships and Trust Management Virus and Antivirus Issues VPN (Virtual Private Network) Wiretapping X.509 Certificates Web Links Click here for newer links
Access Control
Accounts
Administrator Account
Anonymous (Guest) Access
Application-Level Gateway
Attacks and Attackers
Auditing
Authentication and Authorization
Authenticode
Backup and Data Archiving
Bastion Host
Biometric Access Devices
Capstone
CDSA (Common Data Security Architecture)
CERN Proxy Services
CERT (Computer Emergency Response Team)
Certificates and Certification Systems
CHAP (Challenge Handshake Authentication Protocol)
Cryptography
Data Management
Data Protection
Denial of Service Attack
DIAMETER
Digital Signatures
Disaster Planning and Recovery
Distributed Computer Networks
DSS (Digital Signature Standard)
EAP (Extensible Authentication Protocol)
EDI (Electronic Data Interchange)
Electronic Commerce
Extranet
Fault Management
Fault Tolerance and High Availability
Firewall
FORTEZZA
Hacking and Hackers
Hash Functions
ICSA (International Computer Security Association)
Information Warfare
Internet Protocol Suite
IPSec (IP Security)
Kerberos Authentication Protocol
Key Distribution and Management
L2TP (Layer 2 Tunneling Protocol)
Login Scripts
Logons and Logon Accounts
NAS (Network Access Server)
NAT (Network Address Translation)
Network Concepts
NSA (National Security Agency)
One-Time Password Authentication
One-Way Hash Functions
OPSEC (Open Platform for Security)
P3P (Platform for Privacy Preferences)
PAP (Password Authentication Protocol)
Passwords
PGP (Pretty Good Privacy)
PICS (Platform for Internet Content Selection)
PKI (Public-Key Infrastructure)
Power and Grounding Problems and Solutions
PPP (Point-to-Point Protocol)
Proxy Servers
Public-Key Cryptography
Quantum Cryptography
RADIUS (Remote Authentication Dial-In User Service)
Redundancy
Replication
Rights and Permissions
RSA
RSIP (Realm-Specific IP)
S/MIME (Secure Multipurpose Internet Mail Extension)
S/WAN (Secure WAN)
Secret-Key Cryptography
Security Auditing
SET (Secure Electronic Transaction)
S-HTTP (Secure Hypertext Transfer Protocol)
SKIP (Simple Key Management for Internet Protocols)
Smart Cards
SOCKS
SSH (Secure Shell)
SSL (Secure Sockets Layer)
TACACS (Terminal Access Controller Access Control System)
TLS (Transport Layer Security)
Token-Based Authentication
Trust Relationships and Trust Management
Virus and Antivirus Issues
VPN (Virtual Private Network)
Wiretapping
X.509 Certificates
Web Links
IETF Security Working Groups (see Security Area)
http://www.ietf.org/html.charters/wg-dir.html
InfoSysSec (the most thorough and complete security site on the Web)
http://www.infosyssec.net
RSA's Crypto FAQ (highly recommended!)
http://www.rsa.com/rsalabs/faq/
Ron Rivest's Links-possibly the most complete set of links on the Web
http://theory.lcs.mit.edu/~rivest/crypto-security.html
Bruce Schneier's Counterpane Web site (sign up for the newsletter!)
http://www.counterpane.com/
Google Web Directory Security page
http://directory.google.com/Top/Computers/Security/
Microsoft's Security Web page
http://www.microsoft.com/technet/security/
Peter Gutmann's Security and Encryption-Related Resources and Links
http://www.cs.auckland.ac.nz/~pgut001/links.html
Terry Ritter's "Ciphers by Ritter" Web page
http://www.io.com/~ritter/
GILC (Global Internet Liberty Campaign) Cryptography page with news, government policy, and other resources
http://www.gilc.org/crypto/
Security Links at Telecom Information Resources on the Internet
http://china.si.umich.edu/telecom/net-security.html
Computer and Network Security Reference Index
http://www.vtcif.telstra.com.au/info/security.html
New Web Links
--Pending--
Copyright (c) 2001 Tom Sheldon and Big Sur Multimedia. All rights reserved under Pan American and International copyright conventions.