Appendix A. List of Acronyms
ACE | Access Control Entry |
ACL | Access Control List |
AES | Advanced Encryption Standard |
ASCII | American Standard Code for Information Interchange |
CA | Certificate Authority |
CAP | Connection Authorization Policy |
CERN | Conseil Européen pour la Recherche Nucléaire(The European Lab for Nuclear Research) |
CIFS | Common Internet File System |
CLR | Common Language Runtime |
COM | Component Object Model |
DAC | Discretionary Access Control |
DACL | Discretionary Access Control List |
DC | Domain Controller |
DCOM | Distributed Component Object Model |
DMZ | Demilitarized Zone |
DoS | Denial of Service |
DSN | Database Source Name |
EFS | Encrypting File System |
GPG | Gnu Privacy Guard |
GPO | Group Policy Object |
GUID | Global Unique Identifier |
HTTP | Hyper Text Transfer Protocol |
HTTPS | Hyper Text Transfer Protocol Secure |
IDS | Intrusion ... |
Get Thor's Microsoft Security Bible now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.