Skip to Content
Information Security for Managers
book

Information Security for Managers

by Michael Workman, Daniel C. Phelps, John N. Gathegi
February 2012
Intermediate to advanced content levelIntermediate to advanced
594 pages
20h 52m
English
Jones & Bartlett Learning
Content preview from Information Security for Managers

Index

The index that appeared in the print version of this title was intentionally removed from the eBook. Please use the search function on your eReading device to search for terms of interest. For your reference, the terms that appear in the print index are listed below.

A

AAAA records, DNS and Å

Abstract data types

Abstractions

accept system call

ACCESS_ALLOWED_ACE

Access control applications

Access control entries

security flags

types

Access control lists

biometrics and

directory services and

Access controls, Windows

ACCESS_DENIED_ACE

Access matrices

Access tokens

Accountability

ACEs. See Access control entries

Achilles

man-in-the-middle example

ACID properties, electronic transactions defined by

ACLs. See Access control lists

Act-based utilitarianism ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Building an Information Security Awareness Program

Building an Information Security Awareness Program

Bill Gardner, Valerie Thomas

Publisher Resources

ISBN: 9780763793012