C
c2 computers, See Command and control computers (c2 computers)
CA, See Condition-action (CA)
CA protocol, See Collision Avoidance protocol (CA protocol)
CA Unicenter, 736
Cabir, 118
Caesar cipher, See Shift cipher
Call data floods, 862
Call Forwarding Service (CFS), 350
Call walking, 862
Call-forward server (CF server), 357
Callas’ self-assembling PKI, 708
Cameron’s Laws of Identity, 988
Canvas fingerprinting, 751
Capacity, 933
Carbonite, 15t–16t
Card verification number (CVN), 1158b
Cardholder Information Security Program (CISP), 559
Cardholder unique identifier ...
Get Computer and Information Security Handbook, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.