Index
A
abuse, of computers. See computer abuse
acceptance testing, 385
access, 385
controlled, 397
to writing, 448
cloud computing security, 27
mandatory, 35, 153–154, 402, 420
mechanism, 385
access list, 385
access point (AP), 386
accountability, 386
authenticity, 388
e-commerce security, 101
individuality, 413
non-repudiation, 206
accreditation, 386
accreditation authority, 386
ACH. See automated clearing house
acquisition manager (AM), 386
address verification system (AVS), 386
advanced encryption standard (AES), 130–131, 386
AES. See advanced encryption standard
affiliate, 386
AirMagnet Wi-Fi Analyzer, 264–265
AIS. See automated information system
algorithms. See also crypto-algorithm
cryptographic, 398
elliptic curve digital signature, 404
RSA cipher 4, 432
allocation, 386
AM. See acquisition manager
American Express, 6
American National Standards Institute (ANSI), 366, 387
American Standard Code for Information Interchange (ASCII), 387
ANSI. See American National Standards Institute
ANSI X12 standard, 387
AP. See access point
APAC region. See Asia-Pacific region
API. See application programming interface
Apple
application warehousing, 51
applet, 387
application layer, OSI model, 387
application process, 387
application profile, 387
application programming interface (API), 387
authentication for, 201
CAPI, 398
application software, ...
Get Web Commerce Security Design and Development now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.