B

  • Backdoors, 104, 517
  • Back-end database, 389, 391
  • Backups, 288
  • Balanced protocols, 832
  • Bandwidth, 417
  • Bare-metal server
  • BaseBridge, 106–107
  • Base certificate revocation list (CRL), 812–813
  • Base station (BS), 371
  • Baseline, 686
  • Basic authentication, 177
  • BasicConstraints, 811
  • Baudot
  • Bayesian statistics, 585
  • Behavior anomalies, 150
  • Behavior-based approaches, 150
  • Behavior-based detection, 146–147
  • Behavior-based intrusion detection systems, 150
  • Bell–LaPadua (BLP) model, 201, 455
  • Bending process, 412
  • Benford’s law, 29–30
  • Berkely Packet Filter file, 79–80
  • Berkley Software Distribution (BSD), 197
  • Best practices, 644
  • Best Practices, Risk Assessments, ...

Get Computer and Information Security Handbook, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.