I
IaaS, See Infrastructure as a Service (IaaS)
IAM, See Identity and access management (IAM)
IAT, See Import address table (IAT)
IBAC, See Identity Based Access Control (IBAC)
IBAC model, See Identity-based access control model (IBAC model)
iBackup, 15t–16t
IBC, See Identity-based cryptography (IBC)
IBE system, See Identity-based encryption system (IBE system)
IBM Tivoli, 736
ICC, See International Criminal Court (ICC)
Ice storm, 967
ICMP, See Internet Control Message Protocol (ICMP)
ID, See Identifier (ID)
Id, See Identity (Id)
ID-FF, See ...
Get Computer and Information Security Handbook, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.