A
ABC, 103
Abnormal IP packet fragmentation processes, 140
ACAO, see Access-control-allow-origin (ACAO)
Access control
access control lists (ACLs), 36–37
cellular networks security issues, 170
defined, 36
role-based access control (RBAC), 37
Access-control-allow-origin (ACAO), 94
Access control lists (ACLs), 36–37
Access service network gateway (ASN-GW), 174
Accounting, 210
ACLs, see Access control lists (ACLs)
Acoustic cryptanalysis, 11
Acoustic keyloggers, 11
Active mixed content, 94
Address Resolution Protocol (ARP), 118, 123–124
Address space layout randomization (ASLR), 47
Address translation poisoning attacks, 123
Advanced encryption mode (AEM), 86
Advanced Encryption Standard (AES), 82–85, 175
Advanced graphic processors ...
Get Network and Data Security for Non-Engineers now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.