S
S-Tools, 611
SAASPASS Authentication, 721
Sabotage, 1086
“Sacrificial lamb”, 138, 158, 862, 1022b
SafeCopy, 15t–16t
Safeguards Rule, 1158b
SafeSync, 15t–16t
Salvage data, 581b–582b
Sample cascading attack, 355–357, 356f
Sampling synchronization source (SSRC), 864
Sandboxing, ...

Get Computer and Information Security Handbook, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.