S
S-boxes, See Substitution boxes (S-boxes)
S-HEAL, See Self-healing session key distribution (S-HEAL)
S-Tools, 611
SaaS, See Software-as-a-Service (SaaS)
SAASPASS Authentication, 721
Sabotage, 1086
SafeCopy, 15t–16t
Safeguards Rule, 1158b
SafeSync, 15t–16t
Salvage data, 581b–582b
Sampling synchronization source (SSRC), 864
SAN, See Storage area networking (SAN)
SAN certificates, See Subject Alternate Name certificates (SAN certificates)
Sandboxing, ...
Get Computer and Information Security Handbook, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.