Index
As this ebook edition doesn't have fixed pagination, the page numbers below are hyperlinked for reference only, based on the printed edition of this book.
A
access control
implementing 125-127
Account Takeover (ATO) attack 243
ACK (acknowledge) 136
adaptive authentication 127
advanced persistent threat (APT) 366
adversarial attacks 17
seeing, in action 77, 78
adversarial malware examples (AMEs) 362
GAN problems, mitigating 362, 363
mitigation technique, defining based on 364
used, by hackers 364, 365
adversarial ML 52
attack vectors, categorizing 52
hacker mindset, examining 53, 54
Adversarial Robustness Toolbox 81
adware 198
agent 10
aggregate location data 34
air-gapped computers
accessing, methods 360, 361
problems with security, defining through 360, 361
Akamai
reference link 55
algorithmic bias
defining 397
algorithm modification 270
Amazon Fraud Detector
reference...