Index

Note: Page numbers followed by “f”, “t” and “b” refers to figures, tables and boxes, respectively.

A

Abelian group, 42
Abstract Syntax Notation (aka ASN.1), 91–92
Access control subsystem, 126
Access controls, 269
authentication systems, 273b, 275–278
Challenge-Handshake Authentication Protocol (CHAP), 276–277
discretionary access control (DAC), 269
Kerberos, 276–277
logical access controls tools, 273
mandatory access control (MAC), 270–271
physical access control, 273–275
role-based access control (RBAC), 271–272
wireless security access controls, 277–278
Adaptation, 164–165
Additive cipher, 37
Address Resolution Protocol (ARP), 257–258
Advanced data encryption, 325
mathematical concepts, 325–332
cyclic group, 328–329
Discrete Logarithm, ...

Get Cyber Security and IT Infrastructure Protection now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.