Index
A note on the digital index
A link in an index entry is displayed as the section title in which that entry appears. Because some sections have multiple index markers, it is not unusual for an entry to have several links to the same section. Clicking on any link will take you directly to the place in the text in which the marker appears.
Symbols
- (ISC)2 Certified Information System Security Professional CISSP, Early Computer Security Efforts
- 2600 Magazine, Intentional threats
- 3DES, Other Cryptographic Algorithms
- 3WAY, Other Cryptographic Algorithms
- 60-Hz AC (alternating current), The TEMPEST Program
A
- access cards, types of, Biometrics
- access controls
- ACLs, Access control lists
- data, What Makes a System Secure?
- discretionary, Discretionary and Mandatory Access Control
- discretionary access control (DAC), Discretionary access control
- in practice, Discretionary access control
- mandatory, Discretionary and Mandatory Access Control
- mandatory access control (MAC), Discretionary access control, Mandatory access control
- access decisions, Access decisions
- data import and export, Data import and export
- passwords, Protecting your password in storage
- role-based access control (RBAC), Discretionary access control, Role-based access control
- system, Computer System Security and Access Controls
- why use, Discretionary access control
- access decisions, Access decisions
- access points, Today’s Wireless Infrastructure
- rogue, Rogue Access Points
- accessibility, Summary ...
Get Computer Security Basics, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.