Читаем CISSP Practice полностью

Society for Worldwide Interbank Financial Telecommunication

SYN

Synchronized

SZ

Security zone

T

TA

Timing analysis

TACACS

Terminal Access Controller Access Control System

TCB

Trusted computing base

TCG

Trusted computing group

TCP

Transmission Control Protocol

T/TCP

Transactional TCP

TCP/IP

Transmission Control Protocol/Internet Protocol

TCSEC

Trusted Computer System Evaluation Criteria

TDEA

Triple Data Encryption Algorithm (Triple DEA or Triple DES)

TDM

Time division multiplexing

TDMA

Time division multiple access

TEK

Traffic encryption key

TFTP

Trivial File Transfer Protocol

TGS

Ticket-granting service

TKIP

Temporal key integrity protocol

TLS

Transport layer security

TOC-TOU

Time-of-check to time-of-use

T&E

Test & evaluation

TOE

Target of evaluation

TOS

Trusted operating system

ToS

Type of Service

TPM

Trusted Platform Module

TQM

Total quality management

TS

Target server

TSIG

Transaction signature

TSN

Transition Security Network

TSP

Time- stamp Protocol

TTL

Time-to-Live

TTR

Time-to-recover

TTLS

Tunneled transport layer security

TTP

Trusted third party

U

UAC

User Account Control

UDDI

Universal description, discovery, and integration

UDF

Universal Disk Format

UDP

User Datagram Protocol

ULP

Upper layer protocol

UML

Unified modeling language

UPS

Uninterruptible power supply

URI

Uniform Resource Identifier

URL

Uniform Resource Locator

USB

Universal Serial Bus

V

V&V

Verification and Validation

VAN

Value-added network

VB

Visual Basic

VBA

Visual Basic for Applications

VBScript

Visual Basic Script

VDSL

Very high-speed DSL

VHD

Virtual hard drive

VHF

Very high frequency

VLAN

Virtual local-area network

VM

Virtual machine

VoIP

Voice over Internet Protocol

VPN

Virtual private network

VRRP

Virtual Router Redundancy Protocol

VSAT

Very small aperture terminal

W

W3C

World Wide Web consortium

WAN

Wide-area network

WAP

Wireless access point/Wireless application protocol

WBS

Work breakdown structure

WCCP

Web Cache Coordination Protocol

WCDMA

Wideband code division multiple access

WDM

Wavelength division multiplexing

WDMA

Wavelength division multiple access

WDP

Wireless Datagram Protocol

WEP

Wired Equivalent Privacy

WfMS

Workflow management system

WiFi

Wireless Fidelity

WiMax

Worldwide Interoperability for Microwave Access

WfMS

Workflow management system

WLAN

Wireless local-area network

WLL

Wireless local loop

WMAN

Wireless metropolitan-area network

WML

Wireless Markup Language

WMM

WiFi multimedia

WOA

Web-oriented architecture

WORM

Write Once, Read Many

WPA

Wi-Fi Protected Access

WPAN

Wireless personal-area network

WS

Web services

WSDL

Web services description language

WS-I

Web service interoperability organization

WSP

Wireless Session Protocol

WTLS

Wireless transport layer security

WTP

Wireless transaction protocol

WWAN

Wireless wide-area network

WWW

World Wide Web

XYZ

XACL

XML Access Control Language

XACML

Extensible Access Control Markup Language

XCBC

XOR cipher block chaining

XCCDF

Extensible configuration checklist description format

XDSL

Digital Subscriber Line

XHTML

Extended hypertext markup language

XML

Extensible Markup Language

XOR

Exclusive OR

XP

Extreme programming

XrML

eXtensible Rights Markup Language

XSD

XML schema definition

XSL

Extensible style language

XSS

Cross-site scripting

ZSK

Zone Signing Key

Sources and References

“Digital Signature Standard (NIST FIPS PUB 186-3),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, June 2009.

“Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i (NIST SP800-97),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, February 2007.

“Guide to Adopting and Using the Security Content Automation Protocol SCAP (NIST SP800-117 Draft),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, May 2009.

“Guidelines on Cell Phone Forensics (NIST SP800-101),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, May 2007.

“Guidelines on Cell Phone and PDA Security (NIST SP800-124),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, October 2008.

“Guidelines on Firewalls and Firewall Policy (NIST SP800-41R1),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, September 2009.

“Guidelines for Securing Radio Frequency Identification (RFID) Systems (NIST SP800-98),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, August 2007.

Перейти на страницу:

Похожие книги

100 абсолютных законов успеха в бизнесе
100 абсолютных законов успеха в бизнесе

Почему одни люди преуспевают в бизнесе больше других? Почему одни предприятия процветают, в то время как другие терпят крах? Известный лектор и писатель по вопросам бизнеса нашел ответы на эти очень трудные вопросы. В своей книге он представляет набор принципов, или `универсальных законов`, которые лежат в основе успеха деловых людей всего мира. Практические рекомендации Трейси имеют вид 100 доступных для понимания и простых в применении законов, относящихся к важнейшим сферам труда и бизнеса. Он также приводит примеры из реальной жизни, которые наглядно иллюстрируют, как работает каждый из законов, а также предлагает читателю упражнения по применению этих законов в работе и жизни.

Брайан Трейси

Деловая литература / Маркетинг, PR, реклама / О бизнесе популярно / Финансы и бизнес