Index
SYMBOLS
$(), 89
. (period), Linux files, 184
.. (period/double), hidden files, 184
; (semicolon)
command sequence, 125
SQL injection attacks, 176
$#, if, 127
&&.&, Windows separators, 130
& (ampersand), Windows separators, 130
@ (at sign)
net use, 133
ping, 131
\ (backslash), 127
“ (double quotes)
bash, 125
Gawk, 204
= (equal sign), hyperlinks, 132
− (minus sign), Boolean operator, 145
+ (plus sign), Boolean operator, 145
? (question mark), Metasploit, 169
' (single quotes)
bash, 125
Gawk, 204
∼ (tilde), keyword searches, 145
A
A&A. See Assessment and Authorization
access control
healthcare information, 274–275
identity-based, 309
AccessData, Forensics Toolkit (FTK), 179
access-group, 213
ACK (Acknowledgement), 122, 123, 152
Active Server Pages (ASP), 133
Address Resolution Protocol (ARP), 117, 118–119
Address Space Layout Randomization (ASLR), 245
Advanced Log Analysis (ALA), 189–216
Advanced Persistent Threat (APT), 26, 29, 183, 212, 260–261, 282, 294, 300
adware, browsers, 190
afrinic.net, 148
AFX Windows Rootkit, 294
ALA. See Advanced Log Analysis
alert packets, 194
alertipcap, 193
Alexander, Christopher, 15
all, 150
Amap, 157
American Banker's Association, 32
American Recovery and Reinvestment Act (ARRA), 269
AND, Boolean operator, 145
Get Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.