Index

Note: Page numbers followed by “f” and “t” refer to figures and tables, respectively.

A

Aaditya Corporation, e131
Abelian group, 670
Abstract model
network interactions and, 330
cross-infrastructure cyber cascading attacks, 331–334
sample cascading attack, 330–331
vulnerabilities, isolating, 331–334
Abstract Syntax Notation (aka ASN.1), e31–e32
Access
control, 74–75, 87
standards, 451
subsystem, 942–943
mesh routers, 288
SAN
DIF, e64
partitioning, e67–e68
physical, e64
securing management interfaces, e67
separation of functions, ...

Get Computer and Information Security Handbook, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.