Note: Page numbers followed by “f” and “t” refer to figures and tables, respectively.


Aaditya Corporation, e131
Abelian group, 670
Abstract model
network interactions and, 330
cross-infrastructure cyber cascading attacks, 331–334
sample cascading attack, 330–331
vulnerabilities, isolating, 331–334
Abstract Syntax Notation (aka ASN.1), e31–e32
control, 74–75, 87
standards, 451
subsystem, 942–943
mesh routers, 288
DIF, e64
partitioning, e67–e68
physical, e64
securing management interfaces, e67
separation of functions, ...

Get Computer and Information Security Handbook, 2nd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.