O'Reilly logo

Cyber Security: A practitioner's guide by David Sutton

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

INDEX

Diagrams and tables are in italics

abbreviations xiiixv

academia and research as target for cyber crime 467

acceptable use statements 54, 127

access control see also password management

administration accounts 52

definition xxi

least privilege 11920

policies 128, 132, 13940, 141

procedures 110

vulnerabilities 51, 52, 57

acronyms xiiixv

administration accounts 52, 110, 11920, 131

Adobe Acrobat Reader 134

advertising online 24

adware 120

air conditioning systems 45, 55, 578

air traffic control 42

Aircrack-NG 73

aircraft 412, 71

Airwave network 36

Amazon 234

Angry IP Scanner 74

anonymity, information sharing 149, 152

Anonymous 66, 71

antivirus software 53, 89, 108, 116, 117, 132

Apple 223

application layer attacks 77

application ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required