Index

A

access control policies, 263-264

AccessData FTK

Forensics Toolkit, 363

Imager, 356-358

ACK (ACKnowledge) bits, 41

active code scanning, virus scanners, 223

active IDS, 230

active scanning techniques, hacking

enumeration, 142-144

port scanning, 139-142

vulnerability assessment, 142

activities, IDS, 231

Address Resolution Protocol (ARP), 291

addresses (IP), 34, 41

CIDR (classless interdomain routing), 37-39

IPv4, 35-37

IPv6, 38-39

loopback addresses, 36

NAT (network address translation), 37

packets, 40

private, 36

public, 37

subnetting, 37

URLs (uniform resource locators), 39-40

addresses (MAC), 49-50

AddRoundKey step (AES), 198

Adlema, Len, 202

advance-fee scam, 59

Advanced Encryption Standard (AES), 197-199

Blowfish, 199

cipher-block ...

Get Computer Security Fundamentals, Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.