Image

Index

A

Abuse cases, 141, 269

Acceptance testing, 59, 545, xxiii

Access certification, 287

Access control lists (ACLs), 114, 217, 267, 295, 438, 633

Access rights, 16, 114-117, 198-219, 287, 302, 312, 360, 394, 544, 741

Access triple model, 741

Acoustic cryptanalysis attacks, 406

Active/active replication, 195

Active fingerprinting, 477

Active scripting disabled, 381

Address space layout randomization (ASLR), 326

Advanced Encryption Standard (AES), 23, 31, 208, 523

Aggregation attack, 310

Annual loss expectancy (ALE), 22, 23

Annual rate of occurrence (ARO), 22

Anti-debugger code, 430

Apple iPhone applications, 328

Application layer, 5,

Get Official (ISC)2 Guide to the CSSLP CBK, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.