Appendix A. List of Acronyms
ACEAccess Control Entry
ACLAccess Control List
AESAdvanced Encryption Standard
ASCIIAmerican Standard Code for Information Interchange
CACertificate Authority
CAPConnection Authorization Policy
CERNConseil Européen pour la Recherche Nucléaire(The European Lab for Nuclear Research)
CIFSCommon Internet File System
CLRCommon Language Runtime
COMComponent Object Model
DACDiscretionary Access Control
DACLDiscretionary Access Control List
DCDomain Controller
DCOMDistributed Component Object Model
DMZDemilitarized Zone
DoSDenial of Service
DSNDatabase Source Name
EFSEncrypting File System
GPGGnu Privacy Guard
GPOGroup Policy Object
GUIDGlobal Unique Identifier
HTTPHyper Text Transfer Protocol
HTTPSHyper Text Transfer Protocol Secure
IDSIntrusion ...

Get Thor's Microsoft Security Bible now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.