Index
A
abuse, of computers. See computer abuse
acceptance testing, 385
access, 385
controlled, 397
to writing, 448
cloud computing security, 27
mandatory, 35, 153–154, 402, 420
mechanism, 385
access list, 385
access point (AP), 386
accountability, 386
authenticity, 388
e-commerce security, 101
individuality, 413
non-repudiation, 206
accreditation, 386
accreditation authority, 386
ACH. See automated clearing house
acquisition manager (AM), 386
address verification system (AVS), 386
advanced encryption standard (AES), 130–131, 386
AES. See advanced encryption standard
affiliate, 386
AirMagnet Wi-Fi Analyzer, 264–265
AIS. See automated information system
algorithms. See also crypto-algorithm
cryptographic, 398
elliptic curve digital signature, 404
RSA cipher 4, 432
allocation, 386
AM. See acquisition manager
American Express, 6
American National Standards Institute (ANSI), 366, 387
American Standard Code for Information Interchange (ASCII), 387
ANSI. See American National Standards Institute
ANSI X12 standard, 387
AP. See access point
APAC region. See Asia-Pacific region
API. See application programming interface
Apple
application warehousing, 51
applet, 387
application layer, OSI model, 387
application process, 387
application profile, 387
application programming interface (API), 387
authentication for, 201
CAPI, 398
application software, ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access