Index

A

AAA (Authentication, Authorization, and Accounting), 176

Abstract Syntax Tree (ASTs), Zozzle applying to content analysis, 140142

access control

policy decisions and, 70

web access policies, 164167

access logging

filtering access logs, 257

policies, 167170

access points (APs), network security and, 314

ACEs (access control entries), 260

ACLs (access control lists), 260

actions, compared with properties, 181

ad arbitration, 308

ad fraud, 308

ad networks, malvertising attacks, 113114

advanced persistent threats. See APTs (advanced persistent threats)

Advanced RISC Machines (ARM), solutions to mobile security, 311

Aho-Corasick algorithm

extracting matching terms, 208211

Prefix Trees compared with, 212214

AIC (application intelligence and control), firewall deficiencies and, 6

allow policy, vs. deny-all policy, 165

AND operations

bitmap searches and, 276

connecting policy conditions and properties, 163

Android apps. See also Google Android

application signing transparency, 307

library integrity and SSL verification challenges, 307

Android gadgets, 34

Android OS

mobile device market, 299

NFC (Near Field Communication) in mobile devices, 306307

solutions to mobile security, 309310

use of WebView class, 305306

antivirus solutions

access logging policies, 169170

cloud-based, 309

components of content analysis system, 138

embedded devices and, 4

end-point solutions, 121122

implementing security policies, 9091

mobile devices and, 304305

safe content retrieval policies, ...

Get Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.