June 2016
Beginner
448 pages
12h 35m
English
access control policies, 263-264
AccessData FTK
Forensics Toolkit, 363
ACK (ACKnowledge) bits, 41
active code scanning, virus scanners, 223
active IDS, 230
active scanning techniques, hacking
vulnerability assessment, 142
activities, IDS, 231
Address Resolution Protocol (ARP), 291
CIDR (classless interdomain routing), 37-39
loopback addresses, 36
NAT (network address translation), 37
packets, 40
private, 36
public, 37
subnetting, 37
URLs (uniform resource locators), 39-40
AddRoundKey step (AES), 198
Adlema, Len, 202
advance-fee scam, 59
Advanced Encryption Standard (AES), 197-199
Blowfish, 199
cipher-block ...