[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Kahn, David (The Codebreakers) 
Karels, Michael (The Design and Implementation of the 4.4 BSD UNIX Operating System) 
Kaufman, Charles 
    Network Security: Private Communications in a Public World 
Kaufman, Lar (Running Linux) 
Kerberos system  2nd  3rd  4th 
    authentication with 
    installing 
    limitations of 
    logical servers for 
    OpenSSH and 
    random number generator 
    RPC system and 
    server lock and key 
    using 
    using with LDAP 
    using with PAM 
    Versions 4 and 5 
kermit program  2nd 
kernel 
    immutable 
    security levels for  2nd  3rd 
kernel-level firewalls 
Kernighan, Brian (The UNIX Programming Environment) 
key length 
    and brute force attacks 
    search times corresponding to 
    strength relative to crypographic algorithms 
key search attacks  2nd  3rd  4th  5th 
key switches 
keyboard monitors 
keylogin program  2nd 
keylogout program 
keys (encryption/decryption)  2nd  3rd  4th  5th 
keyserv process  2nd  3rd 
keystore file 
keystrokes, monitoring  2nd  3rd  [See also sniffers]
kill command  2nd 
    built in to ksh or csh 
    to stop process overload 
killall command 
Kim, Gene H.  2nd 
kinit program 
Klaus, Christopher William 
kmem device  2nd 
known plaintext attacks  2nd 
Knuth, Donald 
Kochan, Stephen G. (UNIX System Security) 
Korn shell  [See ksh]
Korn, David G. (The New Kornshell Command and Programmang Language) 
ksh (Korn shell)  [See also shells]
    history file 
    programs using 
    prompt 
    published resources on 
    TMOUT variable 
    umask and 
.kshrc file