Index
- 1's complement sum
- 2DES
- 3DES/2
- 3DES/3
- 802.1X
- Abelian group
- access control
- discretionary
- mandatory
- access pattern
- access point (AP), see wireless access point (WAP)
- ActiveX
- ActiveX control
- ad hoc WLAN
- adaptive chosen-query attack (CQA2)
- Adleman, L
- Advanced Encryption Standard
- adware
- AES
- add round key
- add subkey
- inversed S-Box
- mix-columns
- reverse S-Box
- S-Box
- shift-rows
- state matrix
- substitute bytes
- algebraic cryptanalysis
- almost b-conserving
- Amazon Elastic Compute Cloud (EC2)
- Amazon Web Services (AWS)
- anonymous network
- anti-malicious-software system
- antiphishing extension
- AP spoofing
- application gateway
- application-specific integrated circuit (ASIC)
- ARP poisoning
- ARP spoofing
- Asynchronous JavaScript and XML (AJAX)
- avalanche effect
- Avast AntiVirus
- backdoor
- ballot preparation
- ballot tallying
- Barreto P
- Base64 encoding
- bastion host
- batch detection
- BBS pseudorandom bit generator
- beaconing
- behavior signature
- behaviorial data forensics
- Bellare M
- Bertoni G
- bias vector
- bidirectional PRE
- big endian
- binary string
- birthday attack
- set intersection attack
- birthday paradox
- bit
- Bitcoin
- block
- coinbase transaction
- miner
- miners
- network
- transaction record
- unit (BTC)
- Black J
- black-hat hacker
- blackhole attack
- Blaze M
- Bleumer G
- blind signature
- block chain
- block cipher
- block cipher mode
- Bluetooth
- combination key
- initialization key
- link key
- secure pairing
- secure simple pairing (SSP)
- Blum L
- Blum M
- Boneh D
- boot virus
- bootstrap protocols (Bootp)
- botnet, see zombie army
- broadcast attack ...
Get Introduction to Network Security, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.