[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

C programming language 
    ANSI C compiler for 
    ANSI standards for 
    buffer overflows, avoiding 
    GNU 
C shell  [See csh]
C, a Reference Manual (Harbison, Samuel P. and Steele, Guy L., Jr.) 
C2 audit 
cables, network 
    cutting, as destructive attack 
    fiber optic 
    routing of  2nd 
    tampering detectors for 
    wiretapping 
caching
    efficient use of 
    nameserver, poisoning of  2nd 
call forwarding 
callback schemes  2nd 
Caller-ID (CNID)  2nd 
calls, system  [See system calls]
capabilities system, Linux 
car bombs, as destructive attack 
carbon monoxide detectors 
case, of usernames 
cat command  2nd  3rd  4th 
CD-ROM, mounted read-only 
CDA (Communications Decency Act) 
CDFs (context-dependent files) 
ceilings, dropped, access through 
cellular phones 
Cerf, Vint 
CERIAS (Center for Education and Research in Information Assurance and Security) web site 
CERT/CC (Computer Emergency Response Team Coordination Center)
    contact information for 
    mailing list for 
change detection  [See files, detecting changes to]
Chapman, D. Bren (Building Internet Firewalls) 
character devices  2nd 
chargen service  2nd  3rd 
chattr() system call 
chdir() system call  2nd 
checklists for detecting changes 
checksums  2nd 
Cheswick, Bill (Firewalls and Internet Security) 
chflags() system call 
chfn command  2nd 
chgrp command 
child pornography 
child processes 
Children's Internet Protection Act 
chkey command 
chmod command 
    absolute form 
    symbolic form 
chosen plaintext attacks 
chown command 
Christiansen, Tom (Programming Perl) 
chroot jail 
chroot() system call
    with anonymous FTP  2nd  3rd 
    jail() as alternative to 
    using in programs 
chrootuid daemon 
chsh command 
CIAC web site 
CIDR (Classless InterDomain Routing)  2nd 
CIFS (Common Internet File System)  [See SMB]
ciphertext  2nd 
Class A addresses 
Class B addresses 
Class C addresses 
Class D addresses 
Class E addresses 
classical network addresses 
Classless InterDomain Routing (CIDR)  2nd 
cleaning personnel 
Clear to Send (CTS) 
cleartext 
client authentication, SSH 
client flooding 
client-side NFS security 
client/server model 
clients, NIS  [See NIS]
Clipper encryption chip 
clock, system
    changing 
    for random seeds 
    Secure RPC timestamp 
    synchronizing 
clogging (SYN flood attacks) 
closelog() system call 
clri command 
CMW (Compartmented-Mode Workstation) environment 
CNID (Caller-ID) 
COAST (Computer Operations, Audit, and Security Technology) 
code breakers  [See intruders]
Code Breakers: The Inside Story of Bletchley Park (Hinsley, F. H. and Stripp, Alan) 
codebook attacks 
codebooks  2nd 
The Codebreakers (Kahn, David) 
CodeCenter (Centerline) 
collision, message digest values 
Combined Log Format 
Comer, Douglas E.
    (Internetworking with TCP/IP) 
    Xinu developed by 
command shells  [See shells]
commands  [See also specific command names]
    accounts running single 
    format used in book 
    remote execution of 
    running simultaneously  2nd  [See also multitasking]
    trusted computing base (TCB) of 
commenting out services 
COMMIT function (RPC) 
Common Criteria book 
Common Internet File System (CIFS)  [See SMB]
Common Log Format 
Common Object Request Broker Architecture (CORBA) 
Communications Decency Act (CDA) 
Communications of the ACM 
community strings (SNMP) 
comparison copies 
compartmentalization of system privileges 
Compartmented-Mode Workstation (CMW) environment 
compliance audits 
Compressed SLIP (CSLIP) 
Computer Audit Update 
computer crime  [See legal issues]
Computer Crime: A Crimefighter's Handbook (Icove, David; Seger, Karl; VonStorch, William) 
computer criminals  [See intruders]
Computer Emergency Response Team Coordination Center  [See CERT/CC]
computer equipment  [See hardware]
Computer Fraud & Security Update 
Computer Law & Security Report 
Computer Operations, Audit, and Security Technology (COAST) 
Computer Oracle and Password System  [See COPS]
Computer Related Risks (Neumann, Peter G.) 
computer security  [See security]
Computer Security (Gollmann, Dieter) 
Computer Security Alert 
Computer Security Basics (Russell, Deborah and Gangemi, G. T., Sr.) 
Computer Security Buyer's Guide  2nd 
Computer Security Handbook (Hunt, A. E.; Bosworth, S.; Hoyt, D. B.) 
Computer Security Institute (CSI)  2nd 
Computer Security Journal 
Computer Security: A Comprehensive Controls Checklist (Wood, Charles Cresson, et al.) 
Computer Systems Research Group (CSRG) 
computers  [See hardware]
Computers & Security  2nd 
Computers Under Attack: Intruders, Worms, and Viruses (Denning, Peter J.) 
Computrace tracking system 
Concurrent Versions System (CVS)  2nd  3rd 
confidentiality  2nd  3rd  [See also encryption; integrity]
    compared with integrity 
    compared with security through obscurity 
    of employee information 
    Kerberos and 
    Samba and 
configuration files 
    immutable 
    logging 
    nameserver 
    networks 
    newsyslog program 
    paper copies of 
    protecting 
    security of 
    sendmail 
    Swatch program 
    syslog facility 
connection laundering 
connectionless servers (NFS) 
connections
    hijacking 
    tracing 
    unplugging 
connectors, network 
conserver program 
consistency of software 
console device 
CONSOLE variable 
console.perms file 
consultants, security  [See vendors, security]
contact information 
context, for a process 
context-dependent files (CDFs) 
contingency planning  [See disaster planning]
contractors, security  [See vendors, security]
control characters
    conventions for 
    in directory names 
    in filenames 
    in passwords  2nd 
    in usernames 
conventions used in this book 
cookies, magic (Xauthority) 
Cooper, Simon (Building Internet Firewalls) 
copper network cables, routing of 
COPS (Computer Oracle and Password System)  2nd  3rd 
copyright
    comparison copies violating 
    disabling controls for 
    notices in source code and datafiles 
    unlicensed software and 
CORBA (Common Object Request Broker Architecture) 
core files  2nd 
correctness of data and software  [See consistency of software integrity]
cost-benefit analysis  2nd  [See also risks, assessment of]
    best practices as alternative to 
Count Zero (Gibson, William) 
covert channels 
cp command  2nd 
cpio program  2nd 
CPU overload attacks 
Crack program 
cracklib 
crashes, logging 
CRC checksums  [See checksums]
CREATE function (RPC) 
Cred table (NIS+) 
crimes, computer-related  [See legal issues]
criminal complaints, filing 
criminals, as authors of programmed threats  [See also intruders]2nd 
Crocker, Steve 
cron daemon, system clock and 
cron file  2nd  3rd 
crontab files  2nd  3rd  4th 
crypt encryption program 
crypt() system call  2nd  3rd 
crypt16 algorithm 
cryptanalysis 
Cryptfs virtual filesystem 
CryptoCard 
cryptographic filesystems  2nd 
cryptography  2nd  [See also encryption]3rd 
    applications of 
    export controls, and 
    history of 
    hybrid public/private cryptosystems 
    message digest functions  2nd 
    published resources on 
    Secure RPC implementation  2nd 
    security checklist for 
    techniques of 
Cryptography and Data Security (Denning, Dorothy E. R.) 
Cryptography and Network Security: Principles and Practices (Stallings, William) 
csh (C shell)  2nd  [See also shells]
    autologout variable 
    history file 
    programs using 
    prompt for 
.cshrc file  2nd  3rd 
CSI (Computer Security Institute)  2nd 
CSLIP (Compressed SLIP) 
CSRG (Computer Systems Research Group) 
ctime  2nd  3rd  4th 
CTS (Clear to Send) 
cu command  2nd  3rd  4th 
The Cuckoo's Egg (Stoll, Cliff) 
current directory 
Curry, David 
CVS (Concurrent Versions System)  2nd  3rd 
Cyberpunk: Outlaws and Hackers on the Computer Frontier (Hafner, Katie and Markoff, John) 
Cyrus SASL (Simple Authentication and Security Layer)