Index
A
AAA (Authentication, Authorization, and Accounting), 176
Abstract Syntax Tree (ASTs), Zozzle applying to content analysis, 140–142
access control
policy decisions and, 70
access logging
filtering access logs, 257
access points (APs), network security and, 314
ACEs (access control entries), 260
ACLs (access control lists), 260
actions, compared with properties, 181
ad arbitration, 308
ad fraud, 308
ad networks, malvertising attacks, 113–114
advanced persistent threats. See APTs (advanced persistent threats)
Advanced RISC Machines (ARM), solutions to mobile security, 311
Aho-Corasick algorithm
extracting matching terms, 208–211
Prefix Trees compared with, 212–214
AIC (application intelligence and control), firewall deficiencies and, 6
allow policy, vs. deny-all policy, 165
AND operations
bitmap searches and, 276
connecting policy conditions and properties, 163
Android apps. See also Google Android
application signing transparency, 307
library integrity and SSL verification challenges, 307
Android OS
mobile device market, 299
NFC (Near Field Communication) in mobile devices, 306–307
solutions to mobile security, 309–310
antivirus solutions
access logging policies, 169–170
cloud-based, 309
components of content analysis system, 138
embedded devices and, 4
implementing security policies, 90–91
safe content retrieval policies, ...
Get Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.