Index
A P3P Preference Exchange Language (APPEL), 1025–1026
A priori trust, in ad hoc networks, 787
A3 encryption algorithm, 713, 728
A5 encryption algorithm, 713, 728
ABBYY software, 58
Abraham Lincoln papers (Library of Congress), 51
Absolute delay guarantees, 581–582
Absorption, of radio waves, 371
Abstract Syntax notation one (ASN.1), 977. See also ASN.1 distinguished encoding rules (DER)
Abusive language, on bulletin boards, 282
Acceptable use policies, 213, 295
Access
to broadband subscriber files, 781–782
to an outgoing mail server, 894
Access categories (AC), 633
Access control(s), 71, 513, 519, 689
as an EDI security mechanism, 181
with groupware, 114
intranet, 210
with VANs, 182
in wireless communications security, 376–377
Access control firewalls, 28
Access control lists (ACLs), 356, 357, 359, 360, 462, 470, 852
Access control service, 425
ACCESS element, P3P, 1024
Access feedback channel (ACH), 629, 633
Access image, 58
Access management, 64
Access modes
Access networks, 480
Access points (APs), 265, 376, 378, 383, 433, 442, 546, 633, 709, 750, 1009–1011, 1019
in next-generation wireless networks, 735
WLAN, 697
Access provider backbone, in broadband network architecture, 775, 776
Access routers (ARs)
with hierarchical architecture, 745, 746
with MIRAI, 744
with Mobydick, 743
Access security, LAN, 440
Access technologies, MAN and WAN, 447–448
Access units (AUs), in broadband ...
Get Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.