Note: Page numbers followed by “f” and “t” refer to figures and tables, respectively.
Aaditya Corporation, e131
network interactions and, 330
cross-infrastructure cyber cascading attacks, 331–334
vulnerabilities, isolating, 331–334
Abstract Syntax Notation (aka ASN.1), e31–e32
securing management interfaces, e67
separation of functions, ...
Get Computer and Information Security Handbook, 2nd Edition now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.