Book Read Free

Sharks in the Moat

Page 63

by Phil Martin


  test data management system, 308

  test harness, 297

  test plan, 297

  test script, 297

  test strategy, 297

  test suite, 297

  Thick, 281

  Thin, 281

  third normal form, 152

  third parties or suppliers, 231

  threat modeling, 230, 231

  time of check/time of use attack, 211

  time to live, 77

  time-to-live, 81

  timing attack, 205

  TLS, 270

  toc/tou attack, 211

  token-based authentication, 79

  total cost of ownership, 383

  total quality management, 248

  TPM, 115

  TQM, 248

  trade secret, 349

  trademark, 350

  transparent database encryption, 150

  transport layer security, 270

  transport mode, 271

  truncation, 163

  trusted computer base, 254

  trusted computer system evaluation criteria, 254

  trusted platform module, 115

  trusted solaris, 256

  trustworthiness, 370

  TTL, 77, 81

  tunnel mode, 271

  tunneling, 35

  tunneling signatures, 357

  type 1 error, 79

  type 2 error, 79

  type safe, 221

  UAT, 303

  UDDI, 266

  unauthorized access, 128

  unhandled exception, 209

  unicode, 175

  unit testing, 169, 298

  universal description, discovery and interface, 266

  unlinkability, 78, 246

  unstructured data, 59

  url encoding, 187

  us computer emergency response team, 170

  usage rights, 367

  use case, 322

  user acceptance testing, 303

  user mode, 252

  V&V, 327

  van eck attack, 205

  vendor, 369

  verification testing, 299

  vernam cipher, 167

  versioning, 293

  vertical privilege escalation, 306

  vertical scaling, 76

  very high-level, 160

  view, 153

  virtual directory, 288

  virtual machine, 272

  virtualization, 271

  vishing, 146

  visible watermarking, 61

  voice over ip, 146

  VoIP, 146

  volume testing, 300

  vulnerability notes database, 170

  vulnerability scanning, 344

  WCO, 391

  weakest link, 21, 98

  web service, 265

  web service descriptive language, 266, 267

  well-formed transaction, 261

  white box testing, 337

  whitelist, 186

  widening conversion, 163

  wild pointer, 219

  WIPO, 347

  work factor, 64, 167

  work statement, 385

  world customs organization, 391

  world intellection property organization, 347

  WORM, 144

  write-once read-many, 144

  WSDL, 266, 267

  ws-security, 266

  XOR, 167

  XrML, 368

  XSS, 188

  zero knowledge assessment, 338

  zip bomb, 201

  zombie, 283

 

 

 


‹ Prev