July 2022
Intermediate to advanced
864 pages
20h 31m
English
2-step verification, 173
3-D printing, 224
3DES (Triple Digital Encryption Standard), 528
128-bit AES encryption, 490
ABAC (attribute-based access control), 161–162
accept strategy, 565
acceptance testing, 107
kernel, 445
middleware, 445
SELinux (Security-Enhanced Linux), 444
natural, 361
role-based, 161
rule-based, 161
ACLs (access control lists), 49, 267, 612–613
active scanners, 278
ActiveX, 327
actors
APTs (advanced persistent threats), 233–234
black hat, 236
competitors, 234
crackers, 236
gray hat, 236
hackers, 236
hacktivists, 234
identifying techniques, ...